Description
Apress India Enterprise Cybersecurity Study Guide How To Build A Successful Cyberdefense Program Against Advanced Threats by Donaldson
Part I: The cybersecurity challenge.-Chapter 1: defining the cybersecurity challenge.-Chapter 2: meeting the cybersecurity challenge.- Part II: a new enterprise cybersecurity architecture.-Chapter 3: enterprise cybersecurity architecture.-Chapter 4: implementing enterprise cybersecurity.-Chapter 5: operating enterprise cybersecurity.-Chapter 6: enterprise cybersecurity and the cloud.-Chapter 7: enterprise cybersecurity for mobile and BYOD.- Part III: The art of Cyber defense.-Chapter 8: Building an effective defense.-Chapter 9: responding to incidents.-Chapter 10: Managing a cybersecurity crisis.- Part IV: enterprise Cyber defense assessment.-Chapter 11: assessing enterprise cybersecurity.-Chapter 12: measuring a cybersecurity program.-Chapter 13: mapping against cybersecurity frameworks.- Part V: enterprise cybersecurity program.-Chapter 14: Managing an enterprise cybersecurity program.-Chapter 15: looking to the future.- Part VI: appendices.-Appendix a: sample cybersecurity policy.-Appendix B: cybersecurity operational processes.-Appendix C: object Measurement.-AppendixD: cybersecurity Sample assessment.-Appendix e: cybersecurity capability value scales.