0%

Book Description

The real-world guide to defeating hackers and keeping your business secure

Many books discuss the technical underpinnings and complex configurations necessary for cybersecurity—but they fail to address the everyday steps that boards, managers, and employees can take to prevent attacks. The Cybersecurity Playbook is the step-by-step guide to protecting your organization from unknown threats and integrating good security habits into everyday business situations. This book provides clear guidance on how to identify weaknesses, assess possible threats, and implement effective policies. Recognizing that an organization’s security is only as strong as its weakest link, this book offers specific strategies for employees at every level.

Drawing from her experience as CMO of one of the world’s largest cybersecurity companies, author Allison Cerra incorporates straightforward assessments, adaptable action plans, and many current examples to provide practical recommendations for cybersecurity policies. By demystifying cybersecurity and applying the central concepts to real-world business scenarios, this book will help you:

  • Deploy cybersecurity measures using easy-to-follow methods and proven techniques
  • Develop a practical security plan tailor-made for your specific needs
  • Incorporate vital security practices into your everyday workflow quickly and efficiently

The ever-increasing connectivity of modern organizations, and their heavy use of cloud-based solutions present unique challenges: data breaches, malicious software infections, and cyberattacks have become commonplace and costly to organizations worldwide. The Cybersecurity Playbook is the invaluable guide to identifying security gaps, getting buy-in from the top, promoting effective daily security routines, and safeguarding vital resources. Strong cybersecurity is no longer the sole responsibility of IT departments, but that of every executive, manager, and employee.

Table of Contents

  1. Cover
  2. Chapter 1 The Time I Ruined Easter
    1. Lessons Learned the Hard Way
    2. Additional Lessons for You
    3. Who Was at Fault?
    4. Remember This Crucial Element
    5. Why Me?
    6. Why You?
    7. W.I.S.D.O.M.
    8. Note
  3. Chapter 2 Mr./Ms. Cellophane
    1. The New Kid on the Block
    2. W.I.S.D.O.M. for the Board and CEO
    3. Making Mr./Ms. Cellophane Visible
    4. Notes
  4. Chapter 3 “Good Morning, This Is Your Wakeup Call.”
    1. The Best Defense
    2. W.I.S.D.O.M. for the Employee
    3. Notes
  5. Chapter 4 Stop the Line
    1. The Internet of Terrorism
    2. W.I.S.D.O.M. for the Product Developer
    3. Notes
  6. Chapter 5 Bridging the Gap
    1. When Too Much of a Good Thing Is Bad
    2. It Wasn’t Always This Way
    3. W.I.S.D.O.M. for HR Professionals
    4. Notes
  7. Chapter 6 Luck Favors the Prepared
    1. BREACH!
    2. Preparing for Battle
    3. W.I.S.D.O.M. for the Marketer/Communicator
    4. Notes
  8. Chapter 7 Interesting Bedfellows
    1. The More Things Change . . .
    2. . . . the More They Stay the Same
    3. W.I.S.D.O.M. for the Finance Professional
    4. Notes
  9. Chapter 8 Mr./Ms. Cellophane (Reprise)
    1. A Picture Is Worth a Thousand Words
    2. Letting Go to Hold On
    3. Assuming the Mantle
    4. W.I.S.D.O.M. for the Cybersecurity Professional
    5. Notes
  10. Chapter 9 Experiencing a Culture of Security
    1. Notes
  11. Chapter 10 A Culture of Security for All
    1. W.I.S.D.O.M. for the CEO/Board Member
    2. W.I.S.D.O.M. for the Employee
    3. W.I.S.D.O.M. for the Product Developer
    4. W.I.S.D.O.M. for the HR Professional
    5. W.I.S.D.O.M. for the Marketer/Communicator
    6. W.I.S.D.O.M. for the Finance Professional
    7. W.I.S.D.O.M. for the Cybersecurity Professional
    8. Notes
  12. Acknowledgments
  13. About the Author
  14. Index
  15. End User License Agreement
18.117.165.66