The Cyber Security Handbook

    Prepare for, respond to and recover from cyber attacks with the IT Governance Cyber Resilience Framework (CRF)

    99 / 79 *

    Sold Out - Available On:

    jpg.store
     *for wallet holding The Gutenberg Bible

    This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape.

    Description

    In the world as we know it, you can be attacked both physically and virtually. For today’s organisations, which rely so heavily on technology – particularly the Internet – to do business, the latter is the far more threatening of the two. The cyber threat landscape is complex and constantly changing. For every vulnerability fixed, another pops up, ripe for exploitation.

    Because virtually every organisation holds valuable information, often in huge quantities (even if you are a small business), everyone is a target. It should therefore not come as a surprise that 46% of UK businesses alone experienced at least one cyber attack or breach during 2019, which increased to as much as 75% for large businesses. More often than not, organisations cannot do business if they lose access to that information – making it one of their most important assets.

    Suitable for senior directors (CEO, CISO, CIO), compliance managers, privacy managers, IT managers, security analysts and others, the book is divided into six parts:

    Part 1: Introduction
    The world of cyber security and the approach taken in this book.

    Part 2: Threats and vulnerabilities
    A discussion of a range of threats organisations face, organised by threat category, to help you understand what you are defending yourself against before you start thinking about your actual defences.

    Part 3: The CRF processes
    Detailed discussions of each of the 24 CRF processes, explaining a wide range of security areas by process category and offering guidance on how to implement each.

    Part 4: Eight steps to implementing cyber security
    Our eight-step approach to implementing the cyber security processes you need and maintaining them.

    Part 5: Reference frameworks
    An explanation of how standards and frameworks work, along with their benefits. It also presents ten framework options, introducing you to some of the best-known standards and giving you an idea of the range available.

    Part 6: Conclusion and appendices. The appendices include a glossary of all the acronyms and abbreviations used in this book.

    Cyber security does not have to cost vast amounts of money or take years to implement, particularly if you take a strategic approach. It is a worthwhile investment: no matter the size of your organisation, improving cyber security helps protect your data and that of your clients, improving business relations and opening up new business opportunities.

    Whether you are just starting out on the road to cyber security or looking to enhance and improve your existing cyber resilience programme, it should be clear that cyber security is no longer optional in today’s information age; it is an essential component of business success.

    Numbered eBooks: 350

    Number of Unique Covers: 26

    Number of 1:1 Covers: 10

    The Security Locks

    14 Unique Designs
    x 22 Numbered eBooks
    = 308 NFT eBooks
    eBook Numbers 42 - 349
    (88.00% of Supply)

    The Cyber Bank Vault

    2 Unique Designs
    x 16 Numbered eBooks
    = 32 NFT eBooks
    eBook Numbers 10 - 41
    (9.14% of Supply)

    It’s Cyber Secure

    5 Unique Designs
    x 1 Numbered eBooks
    = 5 NFT eBooks
    eBook Numbers 5 - 9
    (1.43% of Supply)

    Warning!

    4 Unique Designs
    x 1 Numbered eBooks
    = 4 NFT eBooks
    eBook Numbers 1 - 4
    (1.14% of Supply)

    The Hacker

    1 Unique Designs
    x 1 Numbered eBooks
    = 1 NFT eBooks
    eBook Numbers 0 - 0
    (0.29% of Supply)

    Details

    Publisher : IT Governance Publishing

    Series : Living Author 2.0

    First Publication Date : 2020

    Author : Alan Calder

    Word Count : 190,000

    Format : DEA (Decentralized Encrypted Asset)

    Read On : Book.io eReader dApp

    Cover Art : Includes 4K hi-resolution book cover

    Cardano Retail Price : 99

    Cardano Discount Price : 79 , for wallet holding The Gutenberg Bible

    Purchase Limit: 3

    Cardano Policy ID : 9121c06bbb1ac1045e0f90ac92660711644a460af3eb0b1e856ef811

    Author Info

    Alan Calder

    Alan Calder is an acknowledged international cyber security guru and a leading author on information security and IT governance issues.

    Alan has been involved in the development of a wide range of information security management training courses that have been accredited by the International Board for IT Governance Qualifications (IBITGQ).
    Alan has consulted for clients in the UK and abroad, and is a regular media commentator and speaker.

    Read More

    en_USEnglish