Home Page Icon
Home Page
Table of Contents for
Part Frontmatter
Close
Part Frontmatter
by Abdul Aslam, Chris K. Williams, Stanley G. Siegel, Scott E. Donaldson
Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats
Cover
Frontmatter
1. Part I: The Cybersecurity Challenge
Part Frontmatter
1. Defining the Cybersecurity Challenge
2. Meeting the Cybersecurity Challenge
2. Part II: A New Enterprise Cybersecurity Architecture
Part Frontmatter
3. Enterprise Cybersecurity Architecture
4. Implementing Enterprise Cybersecurity
5. Operating Enterprise Cybersecurity
6. Enterprise Cybersecurity and the Cloud
7. Enterprise Cybersecurity for Mobile and BYOD
3. Part III: The Art of Cyberdefense
Part Frontmatter
8. Building an Effective Defense
9. Responding to Incidents
10. Managing a Cybersecurity Crisis
4. Part IV: Enterprise Cyberdefense Assessment
Part Frontmatter
11. Assessing Enterprise Cybersecurity
12. Measuring a Cybersecurity Program
13. Mapping Against Cybersecurity Frameworks
5. Part V: Enterprise Cybersecurity Program
Part Frontmatter
14. Managing an Enterprise Cybersecurity Program
15. Looking to the Future
6. Part VI: Appendices
Part Frontmatter
Sample Cybersecurity Policy
Cybersecurity Operational Processes
Object Measurement
Cybersecurity Sample Assessment
Cybersecurity Capability Value Scales
Backmatter
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
4. Part IV: Enterprise Cyberdefense Assessment
Next
Next Chapter
11. Assessing Enterprise Cybersecurity
Enterprise Cyberdefense Assessment
• Chapter 11: Assessing Enterprise Cybersecurity
• Chapter 12: Measuring a Cybersecurity Program
• Chapter 13: Mapping Against Cybersecurity Frameworks
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset