Developing Cybersecurity Programs and Policies, 3rd edition

Published by Pearson IT Certification (July 14, 2021) © 2019

  • Omar Santos Best-selling Cisco Press author, expert trainer, and Principal Engineer at Cisco (PSIRT)

Pearson+ subscription

ISBN-13: 9780137459766
Developing Cybersecurity Programs and Policies
Published 2021

eTextbook features

  • Instant access to eTextbook
  • Search, highlight, and notes
  • Create flashcards

Paperback

ISBN-13: 9780789759405
Developing Cybersecurity Programs and Policies
Published 2018

Details

  • A print text
  • Free shipping
  • Also available for purchase as an ebook from all major ebook resellers, including InformIT.com

This product is expected to ship within 3-6 business days for US and 5-10 business days for Canadian customers.

Products list

Access Details

  • Access courses online from any computer (PC or Mac) or tablet (Android or iOS)
  • Native app available for mobile use; use online, or download and work offline; data syncs automatically 
  • Purchase print or digital codes from your college bookstore, or printed access code cards here

Features

  • Interactive learning elements throughout, including exercises, quizzes, flashcards, and video tutorials

This book is a complete guide to establishing a cybersecurity program and governance in your organization. In this book, studentswill learn how to create cybersecurity policies, standards, procedures, guidelines, and plans — and the differences among them. This book covers the Confidentiality, Integrity & Availability (CIA) security model. Students will also learn how threat actors are launching attacks against their victims compromising confidentiality, integrity, and availability of systems and networks. This book covers the NIST Cybersecurity Framework and ISO/IEC 27000-series standards. Readers will learn how to align security with business strategy, as well as define, inventory, and classify information and systems.

This book teaches students how to systematically identify, prioritize, and manage cybersecurity risks and reduce social engineering (human) risks with role-based Security Education, Awareness, and Training (SETA). They will also learn how to implement effective physical, environmental, communications, and operational security; and effectively manage access control. In this book students will learn how to respond to incidents and ensure continuity of operations and how to comply with laws and regulations, including GLBA, HIPAA/HITECH, FISMA, state data security and notification rules, and PCI DSS.

  • Chapter 1. Understanding Cybersecurity Policy and Governance
  • Chapter 2. Cybersecurity Policy Organization, Format and Styles
  • Chapter 3. Cybersecurity Framework
  • Chapter 4. Governance and Risk Management
  • Chapter 5. Asset Management and Data Loss Prevention
  • Chapter 6. Human Resources Security
  • Chapter 7. Physical and Environmental Security
  • Chapter 8. Communications and Operations Security
  • Chapter 9. Access Control Management
  • Chapter 10. Information Systems Acquisition, Development, and Maintenance
  • Chapter 11. Cybersecurity Incident Response
  • Chapter 12. Business Continuity Management
  • Chapter 13. Regulatory Compliance for Financial Institutions
  • Chapter 14. Regulatory Compliance for the Healthcare Sector
  • Chapter 15. PCI Compliance for Merchants
  • Appendix A. Information Security Program Resources
  • Appendix B. Sample Information Security Policy
  • Appendix C. Information Systems Acceptable Use Agreement and Policy

Need help? Get in touch