Boardroom Cybersecurity
Apress (Verlag)
979-8-8688-0784-8 (ISBN)
- Noch nicht erschienen - erscheint am 14.11.2024
- Versandkostenfrei
- Auch auf Rechnung
- Artikel merken
This book delves into the critical realm of cyber security, specifically focusing on the ever-present threats that can cripple your organization. We will dissect real-world attacks methods and mitigation strategies, analyze industry and regulatory requirements as they impact your boardroom decisions, and expose the vulnerabilities that leave organizations susceptible to data breaches.
But why should cyber security be a top priority for CEOs, directors, and board members? A successful cyber-attack can be catastrophic. Beyond financial losses, data breaches can erode customer trust, damage brand reputation, disrupt critical operations, and even lead to legal ramifications for the board and for directors, such as regulatory fines and lawsuits.
This book empowers you to make informed decisions for your organization regarding cyber risk. We will equip you to not only understand the evolving threat landscape and the potential impact of an attack, but also to proactively reduce and mitigate those risks. This knowledge will ensure you fulfill your reporting obligations and demonstrate strong corporate governance in the face of ever-present cyber threats.
The digital age presents immense opportunities, but it also demands a heightened awareness of cyber security risks. This book is your roadmap to navigating this complex landscape, understanding your obligations as a director or board member, and ensuring your organization remains secure and thrives in this increasingly digital world.
What You Will Learn:
- Typical methods employed by cybercriminal gangs.
- Board and management responsibilities and obligations.
- Common governance principles and standards.
- What are the cybersecurity frameworks and how do they work together?
- Best practices for developing a cybersecurity strategy.
- Understanding penetration testing reports and compliance audits.
- Tips for reading and understanding the audit report.
Who This Book is for:
Boards, directors, and management who have a responsibility over cyber security and ensuring cyber resilience for their organization.
Dan Weis is the Penetration Testing Practice Lead at Nexon Asia Pacific. Dan has over 30 years’ experience in I.T, in a range of different industries, and was one of the first 10 people in the world to become a Certified Ethical Hacker. Dan also has over 18.5+ years of Penetration Testing and Red Team experience with attributed 0day vulnerabilities in SCADA/Control Systems software. Dan heads up Nexon’s team of Cyber Security Experts, leading Red and Blue Teams on Offensive and Defensive Cyber Operations to proactively assess company and government networks to increase their security posture and not become the next "headline". Earning the nickname “The General” as a result of his multitude of industry qualifications, Daniel also holds an additional 22 industry certifications. In his spare time Daniel undertakes research on the cybercrime underground, facilitates training sessions for budding ethical hackers, is a regular on the speaker circuit presenting on all things Infosec & Dark web, and has presented at over 80 conferences and events over the last 5 years. Dan also has appearances on Television and Radio and has a number of published resources including books, magazine articles, newspaper appearances, online posts and YouTube videos, and is an active participant in a variety of renowned security and industry programs. Dan has authored the book "Hack Proof Yourself! The essential guide to securing your digital world," and co-authored the book Learn Social Engineering that has received BookAuthority’s best books of all time award.
Part 1: Understanding the Cyber Security Landscape: Threats, Roles, Governance and Frameworks.- Chapter 1: The Evolving Threat Landscape: Understanding Cyber Threats in the Digital Age.- Chapter 2: Understanding the Who and Why.- Chapter 3: Director Responsibilities and Obligations.- Chapter 4: Common Cyber Governance Principles & Standards.- Chapter 5: Cybersecurity Frameworks.- Part 2: Overseeing Cyber risk: Requirements, Attack Vectors and Mitigation Controls.- Chapter 6: How They Work Together.- Chapter 7: Understanding Cyber Risk and Cyber Resilience.- Chapter 8: We've had an Incident.- Chapter 9: Understanding Penetration Testing Reports and Compliance Audits.
Erscheinungsdatum | 26.10.2024 |
---|---|
Zusatzinfo | 22 Illustrations, color; 3 Illustrations, black and white; XVI, 324 p. 25 illus., 22 illus. in color. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Schlagworte | Attack vectors • Cyber Resilience • cybersecurity • cybersecurity boardroom • Cybersecurity controls • Cybersecurity frameworks • Cybersecurity Governance • cybersecurity governances principle & standards • Cybersecurity risk • data governance • IT functions • Penetration Testing • SIEM • Threat intelligence |
ISBN-13 | 979-8-8688-0784-8 / 9798868807848 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich