Custom cover image
Custom cover image

Securing the enterprise : a practical guide for CISOs, CXOs, and IT security professionals / GS Jha

By: Resource type: Ressourcentyp: Buch (Online)Book (Online)Language: English Publisher: [Berkeley, CA] ; New York, NY : Apress, [2025]Copyright date: © 2025Description: 1 Online-Ressource (xix, 322 Seiten) : IllustrationenISBN:
  • 9798868816543
Subject(s): Additional physical formats: 9798868816536 | 9798868816550 | Erscheint auch als: 9798868816536 Druck-Ausgabe | Erscheint auch als: 9798868816550 Druck-AusgabeDDC classification:
  • 005.8 23
DOI: DOI: 10.1007/979-8-8688-1654-3Online resources: Summary: Part 1: Foundations of Cybersecurity -- Chapter 1: Introduction to Cybersecurity -- Chapter 2: Core Cybersecurity Concepts -- Chapter 3: The Threat Landscape -- Part 2: The Role of Leaders in Cybersecurity -- Chapter 4: The Role of CXOs & Executive Leaders -- Chapter 5: The Role of the Board of Directors -- Chapter 6: The CISO Role & Responsibilities -- Chapter 7: Leadership & Communication -- Chapter 8: CISO Skills & Competencies -- Part 3: Cybersecurity Frameworks & Regulations -- Chapter 9: Key Cybersecurity Frameworks -- Chapter 10: Compliance & Regulations -- Chapter 11: Implementing a Security Program -- Part 4: Advanced Topics in Cybersecurity -- Chapter 12: Cloud Security -- Chapter 13: Security Information & Event Management (SIEM) -- Chapter 14: AI & Machine Learning in Cybersecurity -- Chapter 15: IoT Security -- Chapter 16: Blockchain & Cryptocurrency Security -- Chapter 17: Zero Trust Architecture (ZTA) -- Part 5: Cybersecurity Tabletop Exercises (TTXs) & Case Studies -- Chapter 18: Cybersecurity Tabletop Exercises (TTXs) -- Chapter 19: Notable Cybersecurity Incidents & Lessons Learned -- Chapter 20: Future of Cybersecurity -- Chapter 21: Tabletop Exercise - A Critical Tool for Incident Preparedness -- Chapter 22: David vs. Goliath: Cybersecurity's Constant Struggle.Summary: Cybersecurity is no longer just an IT issue; it is a business-critical function requiring executive oversight and strategic implementation. This book offers a practical approach to cybersecurity leadership, risk management, and frameworks such as NIST, MITRE ATT&CK, and Zero Trust. The book blends executive strategy with hands-on cybersecurity methodologies, providing a holistic understanding for CXOs, CISOs, and IT security professionals. By exploring real-world case studies and breaches, such as SolarWinds and Colonial Pipeline, this book equips you with proactive defense strategies, governance insights, and the technical knowledge required to secure enterprise infrastructures effectively. What You Will Learn Align cybersecurity with business strategy and executive decision making Cover practical implementation of frameworks such as NIST CSF, ISO 27001, and Zero Trust Respond to cyber incidents and build a resilient security culture Understand key cybersecurity principles, including threat intelligence and risk management Study advanced cybersecurity topics, including AI-driven threats, ransomware, and cloud security .PPN: PPN: 1937381994Package identifier: Produktsigel: ZDB-2-SEB | ZDB-2-CWD | ZDB-2-SXPC
No physical items for this record

Barrierefreier Inhalt: PDF/UA-1. Table of contents navigation. Single logical reading order. Short alternative textual descriptions. Use of color is not sole means of conveying information. Use of high contrast between text and background color. Next / Previous structural navigation. All non-decorative content supports reading without sight

Anmerkungen zur Barrierefreiheit: This PDF has been created in accordance with the PDF/UA-1 standard to enhance accessibility, including screen reader support, described non-text content (images, graphs), bookmarks for easy navigation, keyboard-friendly links and forms and searchable, selectable text. We recognize the importance of accessibility, and we welcome queries about accessibility for any of our products. If you have a question or an access need, please get in touch with us at accessibilitysupport@springernature.com. Please note that a more accessible version of this eBook is available as ePub.. No reading system accessibility options actively disabled. Publisher contact for further accessibility information: accessibilitysupport@springernature.com