{"id":14560,"date":"2025-01-22T17:21:43","date_gmt":"2025-01-22T23:21:43","guid":{"rendered":"https:\/\/stuff.io\/book\/cyber-resilience\/"},"modified":"2025-10-15T12:14:03","modified_gmt":"2025-10-15T17:14:03","slug":"cyber-resilience","status":"publish","type":"book-dea","link":"https:\/\/stuff.io\/es\/book\/cyber-resilience\/","title":{"rendered":"Ciberresiliencia"},"content":{"rendered":"<p><br>We live in a world where technology and vast quantities of data play a considerable role in everyday life, both personal and professional.<\/p>\n\n\n\n<p>For the foreseeable future (and perhaps beyond), the growth and prominence of data in business shows no signs of slowing down, even if the technology in question will likely change in ways perhaps unimaginable today. Naturally, all this innovation brings huge opportunities and benefits to organizations and people alike. However, these come at more than just a financial cost.<\/p>\n\n\n\n<p>In the world as we know it, you can be attacked both physically and virtually. For today\u2019s organizations, which rely so heavily on technology \u2013 particularly the Internet \u2013 to do business, being attacked virtually is the far more threatening of the two. The cyber threat landscape is complex and constantly changing. For every vulnerability fixed, another pops up, ripe for exploitation. Worse, when a vulnerability is identified, a tool that can exploit it is often developed and used within hours \u2013 faster than the time it normally takes for the vendor to release a patch, and certainly quicker than the time many organisations take to install that patch.<\/p>\n\n\n\n<p>This book is divided into two parts:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Part 1: Security principles<\/li>\n\n\n\n<li>Part 2: Reference controls<\/li>\n<\/ul>\n\n\n\n<p>Part 1 is designed to give you a concise but solid grounding in the principles of good security, covering key terms, risk management, different aspects of security, defense in depth, implementation tips, and more. This part is best read from beginning to end.<\/p>\n\n\n\n<p>Part 2 is intended as a useful reference, discussing a wide range of good-practice controls (in alphabetical order) you may want to consider implementing. Each control is discussed at a high level, focusing on the broader principles, concepts, and points to consider, rather than specific solutions. Each control has also been written as a standalone chapter, so you can just read the controls that interest you, in an order that suits you.<\/p>\n\n\n\n<p><\/p>","protected":false},"featured_media":14564,"template":"","format":[59],"meta":{"_acf_changed":true},"book-author":[223],"blockchain":[4],"book-genre":[],"narrator":[],"book-publisher":[224],"series":[],"class_list":["post-14560","book-dea","type-book-dea","status-publish","has-post-thumbnail","hentry","book-author-alan-calder","blockchain-cardano","format-ebook","book-publisher-it-governance-publishing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Resilience - Stuff.io<\/title>\n<meta name=\"description\" content=\"The book will give you a good understanding of the fundamentals of cybersecurity and resilience, without tying them to specific standards, frameworks, or solutions\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/stuff.io\/es\/book\/cyber-resilience\/\" \/>\n<meta property=\"og:locale\" content=\"es_MX\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Resilience - Book.io\" \/>\n<meta property=\"og:description\" content=\"The book will give you a good understanding of the fundamentals of cybersecurity and resilience, without tying them to specific standards, frameworks, or solutions\" \/>\n<meta property=\"og:url\" content=\"https:\/\/stuff.io\/es\/book\/cyber-resilience\/\" \/>\n<meta property=\"og:site_name\" content=\"Stuff.io\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-15T17:14:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/stuff.io\/wp-content\/uploads\/2025\/01\/Cyber-Resilience-share-1024x538-1.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Cyber Resilience - Book.io\" \/>\n<meta name=\"twitter:description\" content=\"The book will give you a good understanding of the fundamentals of cybersecurity and resilience, without tying them to specific standards, frameworks, or solutions\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/stuff.io\/wp-content\/uploads\/2025\/01\/Cyber-Resilience-share-1024x538-2.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/stuff.io\/book\/cyber-resilience\/\",\"url\":\"https:\/\/stuff.io\/book\/cyber-resilience\/\",\"name\":\"Cyber Resilience - Stuff.io\",\"isPartOf\":{\"@id\":\"https:\/\/stuff.io\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/stuff.io\/book\/cyber-resilience\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/stuff.io\/book\/cyber-resilience\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/stuff.io\/wp-content\/uploads\/2025\/01\/The-Resilience-4.png\",\"datePublished\":\"2025-01-22T23:21:43+00:00\",\"dateModified\":\"2025-10-15T17:14:03+00:00\",\"description\":\"The book will give you a good understanding of the fundamentals of cybersecurity and resilience, without tying them to specific standards, frameworks, or solutions\",\"breadcrumb\":{\"@id\":\"https:\/\/stuff.io\/book\/cyber-resilience\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/stuff.io\/book\/cyber-resilience\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/stuff.io\/book\/cyber-resilience\/#primaryimage\",\"url\":\"https:\/\/stuff.io\/wp-content\/uploads\/2025\/01\/The-Resilience-4.png\",\"contentUrl\":\"https:\/\/stuff.io\/wp-content\/uploads\/2025\/01\/The-Resilience-4.png\",\"width\":512,\"height\":512},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/stuff.io\/book\/cyber-resilience\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/stuff.io\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Resilience\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/stuff.io\/#website\",\"url\":\"https:\/\/stuff.io\/\",\"name\":\"Stuff.io\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/stuff.io\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"es\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Resilience - Stuff.io","description":"The book will give you a good understanding of the fundamentals of cybersecurity and resilience, without tying them to specific standards, frameworks, or solutions","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/stuff.io\/es\/book\/cyber-resilience\/","og_locale":"es_MX","og_type":"article","og_title":"Cyber Resilience - Book.io","og_description":"The book will give you a good understanding of the fundamentals of cybersecurity and resilience, without tying them to specific standards, frameworks, or solutions","og_url":"https:\/\/stuff.io\/es\/book\/cyber-resilience\/","og_site_name":"Stuff.io","article_modified_time":"2025-10-15T17:14:03+00:00","og_image":[{"url":"https:\/\/stuff.io\/wp-content\/uploads\/2025\/01\/Cyber-Resilience-share-1024x538-1.jpg"}],"twitter_card":"summary_large_image","twitter_title":"Cyber Resilience - Book.io","twitter_description":"The book will give you a good understanding of the fundamentals of cybersecurity and resilience, without tying them to specific standards, frameworks, or solutions","twitter_image":"https:\/\/stuff.io\/wp-content\/uploads\/2025\/01\/Cyber-Resilience-share-1024x538-2.jpg","twitter_misc":{"Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/stuff.io\/book\/cyber-resilience\/","url":"https:\/\/stuff.io\/book\/cyber-resilience\/","name":"Cyber Resilience - Stuff.io","isPartOf":{"@id":"https:\/\/stuff.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/stuff.io\/book\/cyber-resilience\/#primaryimage"},"image":{"@id":"https:\/\/stuff.io\/book\/cyber-resilience\/#primaryimage"},"thumbnailUrl":"https:\/\/stuff.io\/wp-content\/uploads\/2025\/01\/The-Resilience-4.png","datePublished":"2025-01-22T23:21:43+00:00","dateModified":"2025-10-15T17:14:03+00:00","description":"The book will give you a good understanding of the fundamentals of cybersecurity and resilience, without tying them to specific standards, frameworks, or solutions","breadcrumb":{"@id":"https:\/\/stuff.io\/book\/cyber-resilience\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/stuff.io\/book\/cyber-resilience\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/stuff.io\/book\/cyber-resilience\/#primaryimage","url":"https:\/\/stuff.io\/wp-content\/uploads\/2025\/01\/The-Resilience-4.png","contentUrl":"https:\/\/stuff.io\/wp-content\/uploads\/2025\/01\/The-Resilience-4.png","width":512,"height":512},{"@type":"BreadcrumbList","@id":"https:\/\/stuff.io\/book\/cyber-resilience\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/stuff.io\/"},{"@type":"ListItem","position":2,"name":"Cyber Resilience"}]},{"@type":"WebSite","@id":"https:\/\/stuff.io\/#website","url":"https:\/\/stuff.io\/","name":"Stuff.io","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/stuff.io\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"es"}]}},"_links":{"self":[{"href":"https:\/\/stuff.io\/es\/wp-json\/wp\/v2\/book-dea\/14560","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/stuff.io\/es\/wp-json\/wp\/v2\/book-dea"}],"about":[{"href":"https:\/\/stuff.io\/es\/wp-json\/wp\/v2\/types\/book-dea"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/stuff.io\/es\/wp-json\/wp\/v2\/media\/14564"}],"wp:attachment":[{"href":"https:\/\/stuff.io\/es\/wp-json\/wp\/v2\/media?parent=14560"}],"wp:term":[{"taxonomy":"book-author","embeddable":true,"href":"https:\/\/stuff.io\/es\/wp-json\/wp\/v2\/book-author?post=14560"},{"taxonomy":"blockchain","embeddable":true,"href":"https:\/\/stuff.io\/es\/wp-json\/wp\/v2\/blockchain?post=14560"},{"taxonomy":"format","embeddable":true,"href":"https:\/\/stuff.io\/es\/wp-json\/wp\/v2\/format?post=14560"},{"taxonomy":"book-genre","embeddable":true,"href":"https:\/\/stuff.io\/es\/wp-json\/wp\/v2\/book-genre?post=14560"},{"taxonomy":"narrator","embeddable":true,"href":"https:\/\/stuff.io\/es\/wp-json\/wp\/v2\/narrator?post=14560"},{"taxonomy":"book-publisher","embeddable":true,"href":"https:\/\/stuff.io\/es\/wp-json\/wp\/v2\/book-publisher?post=14560"},{"taxonomy":"series","embeddable":true,"href":"https:\/\/stuff.io\/es\/wp-json\/wp\/v2\/series?post=14560"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}