- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book is the essential cybersecurity text for executives in every corporate level and sector. Equally applicable to board members, CEOs and other C-suite officers, and others with leadership and managerial responsibilities, it gives practical advice that equips executives with the knowledge they need to make the right cybersecurity decisions. Written as a Practical Guide, the book explains in plain language how to recognize and act upon cybersecurity threats to protect yourself and your business, how to manage risk, and how to recover when a cyber incident occurs. It gives executives vital…mehr
Andere Kunden interessierten sich auch für
- Hans BergerAutomatisieren mit SIMATIC S7-150092,90 €
- Hans BergerAutomatisieren mit SIMATIC S7-120072,90 €
- Hans BergerAutomatisieren mit SIMATIC44,90 €
- Hans BergerAutomatisieren mit SIMATIC S7-300 im TIA Portal82,90 €
- Hans BergerAutomatisieren mit FUP im TIA Portal39,90 €
- Ricarda KochKommunikationsnetze in der Automatisierungstechnik42,90 €
- Hans BergerAutomatisieren mit KOP im TIA Portal39,90 €
-
-
-
This book is the essential cybersecurity text for executives in every corporate level and sector. Equally applicable to board members, CEOs and other C-suite officers, and others with leadership and managerial responsibilities, it gives practical advice that equips executives with the knowledge they need to make the right cybersecurity decisions. Written as a Practical Guide, the book explains in plain language how to recognize and act upon cybersecurity threats to protect yourself and your business, how to manage risk, and how to recover when a cyber incident occurs. It gives executives vital information needed to understand cybersecurity best practices and how to integrate them into their business to manage risk. Those who read this book will be better prepared to train their personnel, use cybersecurity metrics to protect their bottom line, and act decisively to mitigate and recover from cyber incidents. Through discussions of risk, strategy, policies, change and personnel management, and performance measures, the book provides relevant and timely information to help readers make better decisions regarding cybersecurity. An ideal book for business executives, it also is an important textbook for any computer science, engineering, or business curriculum at both the undergraduate and graduate levels.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Wiley
- Seitenzahl: 416
- Erscheinungstermin: 8. Juli 2014
- Englisch
- Abmessung: 241mm x 161mm x 30mm
- Gewicht: 709g
- ISBN-13: 9781118888148
- ISBN-10: 1118888146
- Artikelnr.: 41198281
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- 06621 890
- Verlag: Wiley
- Seitenzahl: 416
- Erscheinungstermin: 8. Juli 2014
- Englisch
- Abmessung: 241mm x 161mm x 30mm
- Gewicht: 709g
- ISBN-13: 9781118888148
- ISBN-10: 1118888146
- Artikelnr.: 41198281
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- 06621 890
Gregory J. Touhill, CISSP, is a Cybersecurity and Information Technology consultant, academic and author with nearly 30 years of experience creating, sustaining, and defending information technology solutions that are effective, efficient, and secure. An experienced CIO and certified professional director, his team was awarded the 2012 Rowlett Award by the National Security Agency. An adjunct professor at Washington University in St. Louis' College of Engineering and Applied Science graduate programs in Cybersecurity and Information Management, he is engaged in several research projects with industry and academic partners, focusing on Cybersecurity issues. C. Joseph Touhill is a successful CEO, board member, and senior executive. He is highly experienced in creating and managing companies, both large and small. He has been a corporate officer for 41 years, 29 years of which he has been a CEO. Additionally, he has had extensive board and high-level committee experience.
Foreword xiii
Preface xvii
Acknowledgments xxiii
1.0 Introduction 1
1.1 Defining Cybersecurity 1
1.2 Cybersecurity is a Business Imperative 2
1.3 Cybersecurity is an Executive-Level Concern 4
1.4 Questions to Ask 4
1.5 Views of Others 7
1.6 Cybersecurity is a Full-Time Activity 7
2.0 Why Be Concerned? 9
2.1 A Classic Hack 9
2.2 Who Wants Your Fortune? 12
2.3 Nation-State Threats 13
2.3.1 China 13
2.3.2 Don't Think that China is the Only One 17
2.4 Cybercrime is Big Business 20
2.4.1 Mercenary Hackers 20
2.4.2 Hacktivists 25
2.4.3 The Insider Threat 26
2.4.4 Substandard Products and Services 29
2.5 Summary 36
3.0 Managing Risk 37
3.1 Who Owns Risk in Your Business? 37
3.2 What are Your Risks? 38
3.2.1 Threats to Your Intellectual Property and Trade Secrets 38
3.2.2 Technical Risks 42
3.2.3 Human Risks 47
3.3 Calculating Your Risk 54
3.3.1 Quantitative Risk Assessment 55
3.3.2 Qualitative Risk Assessment 63
3.3.3 Risk Decisions 71
3.4 Communicating Risk 77
3.4.1 Communicating Risk Internally 78
3.4.2 Regulatory Communications 79
3.4.3 Communicating with Shareholders 86
3.5 Organizing for Success 89
3.5.1 Risk Management Committee 89
3.5.2 Chief Risk Officers 90
3.6 Summary 91
4.0 Build Your Strategy 95
4.1 How Much "Cybersecurity" Do I Need? 95
4.2 The Mechanics of Building Your Strategy 97
4.2.1 Where are We Now? 99
4.2.2 What do We have to Work with? 103
4.2.3 Where do We Want to be? 104
4.2.4 How do We Get There? 107
4.2.5 Goals and Objectives 108
4.3 Avoiding Strategy Failure 111
4.3.1 Poor Plans, Poor Execution 111
4.3.2 Lack of Communication 113
4.3.3 Resistance to Change 114
4.3.4 Lack of Leadership and Oversight 117
4.4 Ways to Incorporate Cybersecurity into Your Strategy 118
4.4.1 Identify the Information Critical to Your Business 119
4.4.2 Make Cybersecurity Part of Your Culture 119
4.4.3 Consider Cybersecurity Impacts in Your Decisions 119
4.4.4 Measure Your Progress 120
4.5 Plan For Success 121
4.6 Summary 123
5.0 Plan For Success 125
5.1 Turning Vision into Reality 125
5.1.1 Planning for Excellence 127
5.1.2 A Plan of Action 128
5.1.3 Doing Things 131
5.2 Policies Complement Plans 140
5.2.1 Great Cybersecurity Policies for Everyone 140
5.2.2 Be Clear about Your Policies and Who Owns Them 188
5.3 Procedures Implement Plans 190
5.4 Exercise Your Plans 191
5.5 Legal Compliance Concerns 193
5.6 Auditing 195
5.7 Summary 196
6.0 Change Management 199
6.1 Why Managing Change is Important 199
6.2 When to Change? 201
6.3 What is Impacted by Change? 205
6.4 Change Management and Internal Controls 209
6.5 Change Management as a Process 214
6.5.1 The Touhill Change Management Process 215
6.5.2 Following the Process 216
6.5.3 Have a Plan B, Plan C, and maybe a Plan D 220
6.6 Best Practices in Change Management 220
6.7 Summary 224
7.0 Personnel Management 227
7.1 Finding the Right Fit 227
7.2 Creating the Team 229
7.2.1 Picking the Right Leaders 230
7.2.2 Your Cybersecurity Leaders 233
7.3 Establishing Performance Standards 237
7.4 Organizational Considerations 240
7.5 Training for Success 242
7.5.1 Information Every Employee Ought to Know 242
7.5.2 Special Training for Executives 246
7.6 Special Considerations for Critical Infrastructure Protection 249
7.7 Summary 258
8.0 Performance Measures 261
8.1 Why Measure? 261
8.2 What to Measure? 267
8.2.1 Business Drivers 267
8.2.2 Types of Metrics 271
8.3 Metrics and the C-Suite 272
8.3.1 Considerations for the C-Suite 273
8.3.2 Questions about Cybersecurity Executives Should Ask 275
8.4 The Executive Cybersecurity Dashboard 277
8.4.1 How Vulnerable Are We? 277
8.4.2 How Effective Are Our Systems and Processes? 282
8.4.3 Do We Have the Right People, Are They Properly Trained, and Are They
Following Proper Procedures? 286
8.4.4 Am I Spending the Right Amount on Security? 287
8.4.5 How Do We Compare to Others? 288
8.4.6 Creating Your Executive Cybersecurity Dashboard 289
8.5 Summary 291
9.0 What To Do When You Get Hacked 293
9.1 Hackers Already Have You Under Surveillance 293
9.2 Things to do Before it's Too Late: Preparing for the Hack 295
9.2.1 Back Up Your Information 296
9.2.2 Baseline and Define What is Normal 296
9.2.3 Protect Yourself with Insurance 297
9.2.4 Create Your Disaster Recovery and Business Continuity Plan 298
9.3 What to do When Bad Things Happen: Implementing Your Plan 299
9.3.1 Item 1: Don't Panic 300
9.3.2 Item 2: Make Sure You've Been Hacked 301
9.3.3 Item 3: Gain Control 302
9.3.4 Item 4: Reset All Passwords 303
9.3.5 Item 5: Verify and Lock Down All Your External Links 304
9.3.6 Item 6: Update and Scan 305
9.3.7 Item 7: Assess the Damage 305
9.3.8 Item 8: Make Appropriate Notifications 307
9.3.9 Item 9: Find Out Why It Happened and Who Did It 309
9.3.10 Item 10: Adjust Your Defenses 310
9.4 Foot Stompers 310
9.4.1 The Importance of Public Relations 310
9.4.2 Working with Law Enforcement 315
9.4.3 Addressing Liability 317
9.4.4 Legal Issues to Keep an Eye On 318
9.5 Fool Me Once... 319
9.6 Summary 320
10.0 Boardroom Interactions 323
Appendix A: Policies 347
Appendix B: General Rules for Email Etiquette: Sample
Training Handout 357
Glossary 361
Select Bibliography 371
Index 373
Preface xvii
Acknowledgments xxiii
1.0 Introduction 1
1.1 Defining Cybersecurity 1
1.2 Cybersecurity is a Business Imperative 2
1.3 Cybersecurity is an Executive-Level Concern 4
1.4 Questions to Ask 4
1.5 Views of Others 7
1.6 Cybersecurity is a Full-Time Activity 7
2.0 Why Be Concerned? 9
2.1 A Classic Hack 9
2.2 Who Wants Your Fortune? 12
2.3 Nation-State Threats 13
2.3.1 China 13
2.3.2 Don't Think that China is the Only One 17
2.4 Cybercrime is Big Business 20
2.4.1 Mercenary Hackers 20
2.4.2 Hacktivists 25
2.4.3 The Insider Threat 26
2.4.4 Substandard Products and Services 29
2.5 Summary 36
3.0 Managing Risk 37
3.1 Who Owns Risk in Your Business? 37
3.2 What are Your Risks? 38
3.2.1 Threats to Your Intellectual Property and Trade Secrets 38
3.2.2 Technical Risks 42
3.2.3 Human Risks 47
3.3 Calculating Your Risk 54
3.3.1 Quantitative Risk Assessment 55
3.3.2 Qualitative Risk Assessment 63
3.3.3 Risk Decisions 71
3.4 Communicating Risk 77
3.4.1 Communicating Risk Internally 78
3.4.2 Regulatory Communications 79
3.4.3 Communicating with Shareholders 86
3.5 Organizing for Success 89
3.5.1 Risk Management Committee 89
3.5.2 Chief Risk Officers 90
3.6 Summary 91
4.0 Build Your Strategy 95
4.1 How Much "Cybersecurity" Do I Need? 95
4.2 The Mechanics of Building Your Strategy 97
4.2.1 Where are We Now? 99
4.2.2 What do We have to Work with? 103
4.2.3 Where do We Want to be? 104
4.2.4 How do We Get There? 107
4.2.5 Goals and Objectives 108
4.3 Avoiding Strategy Failure 111
4.3.1 Poor Plans, Poor Execution 111
4.3.2 Lack of Communication 113
4.3.3 Resistance to Change 114
4.3.4 Lack of Leadership and Oversight 117
4.4 Ways to Incorporate Cybersecurity into Your Strategy 118
4.4.1 Identify the Information Critical to Your Business 119
4.4.2 Make Cybersecurity Part of Your Culture 119
4.4.3 Consider Cybersecurity Impacts in Your Decisions 119
4.4.4 Measure Your Progress 120
4.5 Plan For Success 121
4.6 Summary 123
5.0 Plan For Success 125
5.1 Turning Vision into Reality 125
5.1.1 Planning for Excellence 127
5.1.2 A Plan of Action 128
5.1.3 Doing Things 131
5.2 Policies Complement Plans 140
5.2.1 Great Cybersecurity Policies for Everyone 140
5.2.2 Be Clear about Your Policies and Who Owns Them 188
5.3 Procedures Implement Plans 190
5.4 Exercise Your Plans 191
5.5 Legal Compliance Concerns 193
5.6 Auditing 195
5.7 Summary 196
6.0 Change Management 199
6.1 Why Managing Change is Important 199
6.2 When to Change? 201
6.3 What is Impacted by Change? 205
6.4 Change Management and Internal Controls 209
6.5 Change Management as a Process 214
6.5.1 The Touhill Change Management Process 215
6.5.2 Following the Process 216
6.5.3 Have a Plan B, Plan C, and maybe a Plan D 220
6.6 Best Practices in Change Management 220
6.7 Summary 224
7.0 Personnel Management 227
7.1 Finding the Right Fit 227
7.2 Creating the Team 229
7.2.1 Picking the Right Leaders 230
7.2.2 Your Cybersecurity Leaders 233
7.3 Establishing Performance Standards 237
7.4 Organizational Considerations 240
7.5 Training for Success 242
7.5.1 Information Every Employee Ought to Know 242
7.5.2 Special Training for Executives 246
7.6 Special Considerations for Critical Infrastructure Protection 249
7.7 Summary 258
8.0 Performance Measures 261
8.1 Why Measure? 261
8.2 What to Measure? 267
8.2.1 Business Drivers 267
8.2.2 Types of Metrics 271
8.3 Metrics and the C-Suite 272
8.3.1 Considerations for the C-Suite 273
8.3.2 Questions about Cybersecurity Executives Should Ask 275
8.4 The Executive Cybersecurity Dashboard 277
8.4.1 How Vulnerable Are We? 277
8.4.2 How Effective Are Our Systems and Processes? 282
8.4.3 Do We Have the Right People, Are They Properly Trained, and Are They
Following Proper Procedures? 286
8.4.4 Am I Spending the Right Amount on Security? 287
8.4.5 How Do We Compare to Others? 288
8.4.6 Creating Your Executive Cybersecurity Dashboard 289
8.5 Summary 291
9.0 What To Do When You Get Hacked 293
9.1 Hackers Already Have You Under Surveillance 293
9.2 Things to do Before it's Too Late: Preparing for the Hack 295
9.2.1 Back Up Your Information 296
9.2.2 Baseline and Define What is Normal 296
9.2.3 Protect Yourself with Insurance 297
9.2.4 Create Your Disaster Recovery and Business Continuity Plan 298
9.3 What to do When Bad Things Happen: Implementing Your Plan 299
9.3.1 Item 1: Don't Panic 300
9.3.2 Item 2: Make Sure You've Been Hacked 301
9.3.3 Item 3: Gain Control 302
9.3.4 Item 4: Reset All Passwords 303
9.3.5 Item 5: Verify and Lock Down All Your External Links 304
9.3.6 Item 6: Update and Scan 305
9.3.7 Item 7: Assess the Damage 305
9.3.8 Item 8: Make Appropriate Notifications 307
9.3.9 Item 9: Find Out Why It Happened and Who Did It 309
9.3.10 Item 10: Adjust Your Defenses 310
9.4 Foot Stompers 310
9.4.1 The Importance of Public Relations 310
9.4.2 Working with Law Enforcement 315
9.4.3 Addressing Liability 317
9.4.4 Legal Issues to Keep an Eye On 318
9.5 Fool Me Once... 319
9.6 Summary 320
10.0 Boardroom Interactions 323
Appendix A: Policies 347
Appendix B: General Rules for Email Etiquette: Sample
Training Handout 357
Glossary 361
Select Bibliography 371
Index 373
Foreword xiii
Preface xvii
Acknowledgments xxiii
1.0 Introduction 1
1.1 Defining Cybersecurity 1
1.2 Cybersecurity is a Business Imperative 2
1.3 Cybersecurity is an Executive-Level Concern 4
1.4 Questions to Ask 4
1.5 Views of Others 7
1.6 Cybersecurity is a Full-Time Activity 7
2.0 Why Be Concerned? 9
2.1 A Classic Hack 9
2.2 Who Wants Your Fortune? 12
2.3 Nation-State Threats 13
2.3.1 China 13
2.3.2 Don't Think that China is the Only One 17
2.4 Cybercrime is Big Business 20
2.4.1 Mercenary Hackers 20
2.4.2 Hacktivists 25
2.4.3 The Insider Threat 26
2.4.4 Substandard Products and Services 29
2.5 Summary 36
3.0 Managing Risk 37
3.1 Who Owns Risk in Your Business? 37
3.2 What are Your Risks? 38
3.2.1 Threats to Your Intellectual Property and Trade Secrets 38
3.2.2 Technical Risks 42
3.2.3 Human Risks 47
3.3 Calculating Your Risk 54
3.3.1 Quantitative Risk Assessment 55
3.3.2 Qualitative Risk Assessment 63
3.3.3 Risk Decisions 71
3.4 Communicating Risk 77
3.4.1 Communicating Risk Internally 78
3.4.2 Regulatory Communications 79
3.4.3 Communicating with Shareholders 86
3.5 Organizing for Success 89
3.5.1 Risk Management Committee 89
3.5.2 Chief Risk Officers 90
3.6 Summary 91
4.0 Build Your Strategy 95
4.1 How Much "Cybersecurity" Do I Need? 95
4.2 The Mechanics of Building Your Strategy 97
4.2.1 Where are We Now? 99
4.2.2 What do We have to Work with? 103
4.2.3 Where do We Want to be? 104
4.2.4 How do We Get There? 107
4.2.5 Goals and Objectives 108
4.3 Avoiding Strategy Failure 111
4.3.1 Poor Plans, Poor Execution 111
4.3.2 Lack of Communication 113
4.3.3 Resistance to Change 114
4.3.4 Lack of Leadership and Oversight 117
4.4 Ways to Incorporate Cybersecurity into Your Strategy 118
4.4.1 Identify the Information Critical to Your Business 119
4.4.2 Make Cybersecurity Part of Your Culture 119
4.4.3 Consider Cybersecurity Impacts in Your Decisions 119
4.4.4 Measure Your Progress 120
4.5 Plan For Success 121
4.6 Summary 123
5.0 Plan For Success 125
5.1 Turning Vision into Reality 125
5.1.1 Planning for Excellence 127
5.1.2 A Plan of Action 128
5.1.3 Doing Things 131
5.2 Policies Complement Plans 140
5.2.1 Great Cybersecurity Policies for Everyone 140
5.2.2 Be Clear about Your Policies and Who Owns Them 188
5.3 Procedures Implement Plans 190
5.4 Exercise Your Plans 191
5.5 Legal Compliance Concerns 193
5.6 Auditing 195
5.7 Summary 196
6.0 Change Management 199
6.1 Why Managing Change is Important 199
6.2 When to Change? 201
6.3 What is Impacted by Change? 205
6.4 Change Management and Internal Controls 209
6.5 Change Management as a Process 214
6.5.1 The Touhill Change Management Process 215
6.5.2 Following the Process 216
6.5.3 Have a Plan B, Plan C, and maybe a Plan D 220
6.6 Best Practices in Change Management 220
6.7 Summary 224
7.0 Personnel Management 227
7.1 Finding the Right Fit 227
7.2 Creating the Team 229
7.2.1 Picking the Right Leaders 230
7.2.2 Your Cybersecurity Leaders 233
7.3 Establishing Performance Standards 237
7.4 Organizational Considerations 240
7.5 Training for Success 242
7.5.1 Information Every Employee Ought to Know 242
7.5.2 Special Training for Executives 246
7.6 Special Considerations for Critical Infrastructure Protection 249
7.7 Summary 258
8.0 Performance Measures 261
8.1 Why Measure? 261
8.2 What to Measure? 267
8.2.1 Business Drivers 267
8.2.2 Types of Metrics 271
8.3 Metrics and the C-Suite 272
8.3.1 Considerations for the C-Suite 273
8.3.2 Questions about Cybersecurity Executives Should Ask 275
8.4 The Executive Cybersecurity Dashboard 277
8.4.1 How Vulnerable Are We? 277
8.4.2 How Effective Are Our Systems and Processes? 282
8.4.3 Do We Have the Right People, Are They Properly Trained, and Are They
Following Proper Procedures? 286
8.4.4 Am I Spending the Right Amount on Security? 287
8.4.5 How Do We Compare to Others? 288
8.4.6 Creating Your Executive Cybersecurity Dashboard 289
8.5 Summary 291
9.0 What To Do When You Get Hacked 293
9.1 Hackers Already Have You Under Surveillance 293
9.2 Things to do Before it's Too Late: Preparing for the Hack 295
9.2.1 Back Up Your Information 296
9.2.2 Baseline and Define What is Normal 296
9.2.3 Protect Yourself with Insurance 297
9.2.4 Create Your Disaster Recovery and Business Continuity Plan 298
9.3 What to do When Bad Things Happen: Implementing Your Plan 299
9.3.1 Item 1: Don't Panic 300
9.3.2 Item 2: Make Sure You've Been Hacked 301
9.3.3 Item 3: Gain Control 302
9.3.4 Item 4: Reset All Passwords 303
9.3.5 Item 5: Verify and Lock Down All Your External Links 304
9.3.6 Item 6: Update and Scan 305
9.3.7 Item 7: Assess the Damage 305
9.3.8 Item 8: Make Appropriate Notifications 307
9.3.9 Item 9: Find Out Why It Happened and Who Did It 309
9.3.10 Item 10: Adjust Your Defenses 310
9.4 Foot Stompers 310
9.4.1 The Importance of Public Relations 310
9.4.2 Working with Law Enforcement 315
9.4.3 Addressing Liability 317
9.4.4 Legal Issues to Keep an Eye On 318
9.5 Fool Me Once... 319
9.6 Summary 320
10.0 Boardroom Interactions 323
Appendix A: Policies 347
Appendix B: General Rules for Email Etiquette: Sample
Training Handout 357
Glossary 361
Select Bibliography 371
Index 373
Preface xvii
Acknowledgments xxiii
1.0 Introduction 1
1.1 Defining Cybersecurity 1
1.2 Cybersecurity is a Business Imperative 2
1.3 Cybersecurity is an Executive-Level Concern 4
1.4 Questions to Ask 4
1.5 Views of Others 7
1.6 Cybersecurity is a Full-Time Activity 7
2.0 Why Be Concerned? 9
2.1 A Classic Hack 9
2.2 Who Wants Your Fortune? 12
2.3 Nation-State Threats 13
2.3.1 China 13
2.3.2 Don't Think that China is the Only One 17
2.4 Cybercrime is Big Business 20
2.4.1 Mercenary Hackers 20
2.4.2 Hacktivists 25
2.4.3 The Insider Threat 26
2.4.4 Substandard Products and Services 29
2.5 Summary 36
3.0 Managing Risk 37
3.1 Who Owns Risk in Your Business? 37
3.2 What are Your Risks? 38
3.2.1 Threats to Your Intellectual Property and Trade Secrets 38
3.2.2 Technical Risks 42
3.2.3 Human Risks 47
3.3 Calculating Your Risk 54
3.3.1 Quantitative Risk Assessment 55
3.3.2 Qualitative Risk Assessment 63
3.3.3 Risk Decisions 71
3.4 Communicating Risk 77
3.4.1 Communicating Risk Internally 78
3.4.2 Regulatory Communications 79
3.4.3 Communicating with Shareholders 86
3.5 Organizing for Success 89
3.5.1 Risk Management Committee 89
3.5.2 Chief Risk Officers 90
3.6 Summary 91
4.0 Build Your Strategy 95
4.1 How Much "Cybersecurity" Do I Need? 95
4.2 The Mechanics of Building Your Strategy 97
4.2.1 Where are We Now? 99
4.2.2 What do We have to Work with? 103
4.2.3 Where do We Want to be? 104
4.2.4 How do We Get There? 107
4.2.5 Goals and Objectives 108
4.3 Avoiding Strategy Failure 111
4.3.1 Poor Plans, Poor Execution 111
4.3.2 Lack of Communication 113
4.3.3 Resistance to Change 114
4.3.4 Lack of Leadership and Oversight 117
4.4 Ways to Incorporate Cybersecurity into Your Strategy 118
4.4.1 Identify the Information Critical to Your Business 119
4.4.2 Make Cybersecurity Part of Your Culture 119
4.4.3 Consider Cybersecurity Impacts in Your Decisions 119
4.4.4 Measure Your Progress 120
4.5 Plan For Success 121
4.6 Summary 123
5.0 Plan For Success 125
5.1 Turning Vision into Reality 125
5.1.1 Planning for Excellence 127
5.1.2 A Plan of Action 128
5.1.3 Doing Things 131
5.2 Policies Complement Plans 140
5.2.1 Great Cybersecurity Policies for Everyone 140
5.2.2 Be Clear about Your Policies and Who Owns Them 188
5.3 Procedures Implement Plans 190
5.4 Exercise Your Plans 191
5.5 Legal Compliance Concerns 193
5.6 Auditing 195
5.7 Summary 196
6.0 Change Management 199
6.1 Why Managing Change is Important 199
6.2 When to Change? 201
6.3 What is Impacted by Change? 205
6.4 Change Management and Internal Controls 209
6.5 Change Management as a Process 214
6.5.1 The Touhill Change Management Process 215
6.5.2 Following the Process 216
6.5.3 Have a Plan B, Plan C, and maybe a Plan D 220
6.6 Best Practices in Change Management 220
6.7 Summary 224
7.0 Personnel Management 227
7.1 Finding the Right Fit 227
7.2 Creating the Team 229
7.2.1 Picking the Right Leaders 230
7.2.2 Your Cybersecurity Leaders 233
7.3 Establishing Performance Standards 237
7.4 Organizational Considerations 240
7.5 Training for Success 242
7.5.1 Information Every Employee Ought to Know 242
7.5.2 Special Training for Executives 246
7.6 Special Considerations for Critical Infrastructure Protection 249
7.7 Summary 258
8.0 Performance Measures 261
8.1 Why Measure? 261
8.2 What to Measure? 267
8.2.1 Business Drivers 267
8.2.2 Types of Metrics 271
8.3 Metrics and the C-Suite 272
8.3.1 Considerations for the C-Suite 273
8.3.2 Questions about Cybersecurity Executives Should Ask 275
8.4 The Executive Cybersecurity Dashboard 277
8.4.1 How Vulnerable Are We? 277
8.4.2 How Effective Are Our Systems and Processes? 282
8.4.3 Do We Have the Right People, Are They Properly Trained, and Are They
Following Proper Procedures? 286
8.4.4 Am I Spending the Right Amount on Security? 287
8.4.5 How Do We Compare to Others? 288
8.4.6 Creating Your Executive Cybersecurity Dashboard 289
8.5 Summary 291
9.0 What To Do When You Get Hacked 293
9.1 Hackers Already Have You Under Surveillance 293
9.2 Things to do Before it's Too Late: Preparing for the Hack 295
9.2.1 Back Up Your Information 296
9.2.2 Baseline and Define What is Normal 296
9.2.3 Protect Yourself with Insurance 297
9.2.4 Create Your Disaster Recovery and Business Continuity Plan 298
9.3 What to do When Bad Things Happen: Implementing Your Plan 299
9.3.1 Item 1: Don't Panic 300
9.3.2 Item 2: Make Sure You've Been Hacked 301
9.3.3 Item 3: Gain Control 302
9.3.4 Item 4: Reset All Passwords 303
9.3.5 Item 5: Verify and Lock Down All Your External Links 304
9.3.6 Item 6: Update and Scan 305
9.3.7 Item 7: Assess the Damage 305
9.3.8 Item 8: Make Appropriate Notifications 307
9.3.9 Item 9: Find Out Why It Happened and Who Did It 309
9.3.10 Item 10: Adjust Your Defenses 310
9.4 Foot Stompers 310
9.4.1 The Importance of Public Relations 310
9.4.2 Working with Law Enforcement 315
9.4.3 Addressing Liability 317
9.4.4 Legal Issues to Keep an Eye On 318
9.5 Fool Me Once... 319
9.6 Summary 320
10.0 Boardroom Interactions 323
Appendix A: Policies 347
Appendix B: General Rules for Email Etiquette: Sample
Training Handout 357
Glossary 361
Select Bibliography 371
Index 373