Sold Out - Available On:
jpg.storeThis book is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape.
In the world as we know it, you can be attacked both physically and virtually. For today’s organisations, which rely so heavily on technology – particularly the Internet – to do business, the latter is the far more threatening of the two. The cyber threat landscape is complex and constantly changing. For every vulnerability fixed, another pops up, ripe for exploitation.
Because virtually every organisation holds valuable information, often in huge quantities (even if you are a small business), everyone is a target. It should therefore not come as a surprise that 46% of UK businesses alone experienced at least one cyber attack or breach during 2019, which increased to as much as 75% for large businesses. More often than not, organisations cannot do business if they lose access to that information – making it one of their most important assets.
Suitable for senior directors (CEO, CISO, CIO), compliance managers, privacy managers, IT managers, security analysts and others, the book is divided into six parts:
Part 1: Introduction
The world of cyber security and the approach taken in this book.
Part 2: Threats and vulnerabilities
A discussion of a range of threats organisations face, organised by threat category, to help you understand what you are defending yourself against before you start thinking about your actual defences.
Part 3: The CRF processes
Detailed discussions of each of the 24 CRF processes, explaining a wide range of security areas by process category and offering guidance on how to implement each.
Part 4: Eight steps to implementing cyber security
Our eight-step approach to implementing the cyber security processes you need and maintaining them.
Part 5: Reference frameworks
An explanation of how standards and frameworks work, along with their benefits. It also presents ten framework options, introducing you to some of the best-known standards and giving you an idea of the range available.
Part 6: Conclusion and appendices. The appendices include a glossary of all the acronyms and abbreviations used in this book.
Cyber security does not have to cost vast amounts of money or take years to implement, particularly if you take a strategic approach. It is a worthwhile investment: no matter the size of your organisation, improving cyber security helps protect your data and that of your clients, improving business relations and opening up new business opportunities.
Whether you are just starting out on the road to cyber security or looking to enhance and improve your existing cyber resilience programme, it should be clear that cyber security is no longer optional in today’s information age; it is an essential component of business success.
Numbered eBooks: 350
Number of Unique Covers: 26
Number of 1:1 Covers: 10
14 Unique Designs
x 22 Numbered eBooks
= 308 NFT eBooks
eBook Numbers 42 - 349
(88.00% of Supply)
2 Unique Designs
x 16 Numbered eBooks
= 32 NFT eBooks
eBook Numbers 10 - 41
(9.14% of Supply)
5 Unique Designs
x 1 Numbered eBooks
= 5 NFT eBooks
eBook Numbers 5 - 9
(1.43% of Supply)
4 Unique Designs
x 1 Numbered eBooks
= 4 NFT eBooks
eBook Numbers 1 - 4
(1.14% of Supply)
1 Unique Designs
x 1 Numbered eBooks
= 1 NFT eBooks
eBook Numbers 0 - 0
(0.29% of Supply)
Publisher : IT Governance Publishing
Series : Living Author 2.0
First Publication Date : 2020
Author : Alan Calder
Word Count : 190,000
Format : DEA (Decentralized Encrypted Asset)
Read On : Book.io eReader dApp
Cover Art : Includes 4K hi-resolution book cover
Cardano Retail Price : 99
Cardano Discount Price : 79 , for wallet holding The Gutenberg Bible
Purchase Limit: 3
Cardano Policy ID : 9121c06bbb1ac1045e0f90ac92660711644a460af3eb0b1e856ef811
Alan Calder is an acknowledged international cyber security guru and a leading author on information security and IT governance issues.
Alan has been involved in the development of a wide range of information security management training courses that have been accredited by the International Board for IT Governance Qualifications (IBITGQ).
Alan has consulted for clients in the UK and abroad, and is a regular media commentator and speaker.
Recommended textbook for the UK Open University’s postgraduate information security course and the recommended text for all IBITGQ ISO 27001 courses
In this updated edition, renowned ISO 27001/27002 experts Alan Calder and Steve Watkins:
Discuss the ISO 27001/27002:2022 updates
Provide guidance on how to establish a strong IT governance system and an ISMS (information security management system) that complies with ISO 27001 and ISO 27002
Highlight why data protection and information security … Read More
Winner of “Best Cyber Book of the Year” at The Real Cyber Awards 2023!
The book will give you a good understanding of the fundamentals of cybersecurity and resilience, without tying them to specific standards, frameworks, or solutions, and provide an excellent starting point for any cyber resilience implementation project.
Read More
ISO 27001 is one of the leading information security standards. It offers an internationally recognized route for organizations of all sizes and industries to adopt and demonstrate effective, independently verified information security.
This book will help you understand:
How ISO 27001 and ISO 27002 can benefit your organization
The requirements of ISO 27001:2022 and ISO 27002:2022
The ISO certification process
Key terms and definitions used within these standards