This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
SDMmag logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
SDMmag logo
  • EMAGAZINE
    • eMagazine
    • Archive Issues
    • Monitoring Today
    • Contact
    • Advertise
    • Subscribe
  • PRODUCTS
  • NEWS
    • SDM Newswire
    • COVID-19 Coverage
  • EXCLUSIVES
    • SDM 100
    • Top Systems Integrator Report
    • Annual Industry Forecast
    • State of the Market Series
    • Dealer of the Year
    • Systems Integrator of the Year
    • Project of the Year
  • TOPICS
    • Trends & Industry Issues
    • Video Solutions
    • Access Control & Identification
    • Smart Home
    • More SDM Topics
  • COLUMNS
    • Editor's Angle
    • 5-Minute Tech Quiz
    • Security & the Law
    • Integration Spotlight
    • Security Networkings
    • Digital Shuffle
    • Technology @ Work
    • Insider News & Business
    • Technology Solutions & Skills
    • Marketing Madmen
    • Workforce Strategies
  • BLOG
  • EVENTS
    • Industry Calendar
    • SDM 100 Gala @ ESX
    • Webinars
  • MORE
    • Videos
    • Podcasts
    • Polls
    • Photo Galleries
    • Newsletters
    • Classified Ads
    • SDM Store
    • White Papers
    • Sponsor Insights
    • More Resources
  • BUYERS GUIDE
    • Buyers Guide
    • Take a Tour
    • SDM Buyers Guide eBook
  • INFOCENTERS
    • Helping Your Security Customers Rebound
Home » Store » Books » Cyber Strategy: Risk-Driven Security and Resiliency
9780367339456.jpg

Cyber Strategy: Risk-Driven Security and Resiliency

$132.00
Books

Product Details

April 13, 2020
Reference - 206 Pages - 116 B/W Illustrations
ISBN 9780367458171 - hardback
 

Cyber Strategy: Risk-Driven Security and Resiliency provides a process and roadmap for any company to develop its unified Cybersecurity and Cyber Resiliency strategies. It demonstrates a methodology for companies to combine their disassociated efforts into one corporate plan with buy-in from senior management that will efficiently utilize resources, target high risk threats, and evaluate risk assessment methodologies and the efficacy of resultant risk mitigations. The book discusses all the steps required from conception of the plan from pre-planning (mission/vision, principles, strategic objectives, new initiatives derivation), project management directives, cyber threat and vulnerability analysis, cyber risk and controls assessment to reporting and measurement techniques for plan success and overall strategic plan performance. In addition, a methodology is presented to aid in new initiative selection for the following year by identifying all relevant inputs.

Tools utilized include:

  • Key Risk Indicators (KRI) and Key Performance Indicators (KPI)
  • National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF) Target State Maturity interval mapping per initiative
  • Comparisons of current and target state business goals and critical success factors
  • A quantitative NIST-based risk assessment of initiative technology components
  • Responsible, Accountable, Consulted, Informed (RACI) diagrams for Cyber Steering Committee tasks and Governance Boards’ approval processes
  • Swimlanes, timelines, data flow diagrams (inputs, resources, outputs), progress report templates, and Gantt charts for project management

The last chapter provides downloadable checklists, tables, data flow diagrams, figures, and assessment tools to help develop your company’s cybersecurity and cyber resiliency strategic plan.

 

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest security marketplace trends.

SUBSCRIBE TODAY!
  • Resources
    • List Rental
    • Online Exclusives
    • Industry Innovations
    • Partners
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY
    • UPDATE MY PREFERENCES

Copyright ©2023. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing