Home > Store

Developing Cybersecurity Programs and Policies, 3rd Edition

Register your product to gain access to bonus material or receive a coupon.

Developing Cybersecurity Programs and Policies, 3rd Edition

Best Value Purchase

Book + eBook Bundle

  • Your Price: $90.40
  • List Price: $144.00
  • Includes EPUB, MOBI, and PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from your Account page after purchase:

    ePub EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    MOBI MOBI The eBook format compatible with the Amazon Kindle and Amazon Kindle applications.

    Adobe Reader PDF The popular standard, used most often with the free Adobe® Reader® software.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

More Purchase Options

Book

  • Your Price: $68.00
  • List Price: $80.00
  • Estimated Release: Jul 27, 2018

eBook (Watermarked)

  • Your Price: $54.40
  • List Price: $64.00
  • Estimated Release: Jul 27, 2018
  • Includes EPUB, MOBI, and PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from your Account page after purchase:

    ePub EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    MOBI MOBI The eBook format compatible with the Amazon Kindle and Amazon Kindle applications.

    Adobe Reader PDF The popular standard, used most often with the free Adobe® Reader® software.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

About

Features

  • The in-depth, up-to-the-minute guide to information security policy for every practitioner and advanced student
  • In-depth coverage of information security policy from definition, psychology, standard frameworks, and creating a culture of compliance
  • Thorough coverage of Security Education, Training & Awareness (SETA)
  • Appendices include: Employee Affirmation Statement and Resources for Security Professionals

Description

  • Copyright 2019
  • Dimensions: 7" x 9-1/8"
  • Pages: 600
  • Edition: 3rd
  • Book
  • ISBN-10: 0-7897-5940-3
  • ISBN-13: 978-0-7897-5940-5

This book is a complete guide to establishing a cybersecurity program and governance in your organization. In this book, you will learn how to create cybersecurity policies, standards, procedures, guidelines, and plans —and the differences among them. This book covers the Confidentiality, Integrity & Availability (CIA) security model. You will also learn how threat actors are launching attacks against their victims compromising confidentiality, integrity, and availability of systems and networks. This book covers the NIST Cybersecurity Framework and ISO/IEC 27000-series standards. You will learn how to align security with business strategy, as well as define, inventory, and classify your information and systems.

This book teaches you how to systematically identify, prioritize, and manage cybersecurity risks and reduce social engineering (human) risks with role-based Security Education, Awareness, and Training (SETA). You will also learn how to implement effective physical, environmental, communications, and operational security; and effectively manage access control. In this book you will learn how to respond to incidents and ensure continuity of operations and how to comply with laws and regulations, including GLBA, HIPAA/HITECH, FISMA, state data security and notification rules, and PCI DSS.

Sample Content

Table of Contents

Chapter 1. Understanding Cybersecurity Policy and Governance
Chapter 2. Cybersecurity Policy Organization, Format and Styles
Chapter 3. Cybersecurity Framework
Chapter 4. Governance and Risk Management
Chapter 5. Asset Management and Data Loss Prevention
Chapter 6. Human Resources Security
Chapter 7. Physical and Environmental Security
Chapter 8. Communications and Operations Security
Chapter 9. Access Control Management
Chapter 10. Information Systems Acquisition, Development, and Maintenance
Chapter 11. Cybersecurity Incident Response
Chapter 12. Business Continuity Management
Chapter 13. Regulatory Compliance for Financial Institutions
Chapter 14. Regulatory Compliance for the Healthcare Sector
Chapter 15. PCI Compliance for Merchants
Appendix A. Information Security Program Resources
Appendix B. Sample Information Security Policy
Appendix C. Information Systems Acceptable Use Agreement and Policy

Updates

Submit Errata

More Information

Unlimited one-month access with your purchase
Free Safari Membership