Understand and respond to a new generation of cybersecurity threats Cybersecurity has never been a more significant concern of modern businesses, with security breaches and confidential data exposure as potentially existential risks. Managing these risks and maintaining compliance with agreed-upon cybersecurity policies is the focus of Cybersecurity Governance and Risk Management. This field is becoming ever more critical as a result. A wide variety of different roles and categories of business professionals have an urgent need for fluency in the language of cybersecurity risk management. The…mehr
Understand and respond to a new generation of cybersecurity threats Cybersecurity has never been a more significant concern of modern businesses, with security breaches and confidential data exposure as potentially existential risks. Managing these risks and maintaining compliance with agreed-upon cybersecurity policies is the focus of Cybersecurity Governance and Risk Management. This field is becoming ever more critical as a result. A wide variety of different roles and categories of business professionals have an urgent need for fluency in the language of cybersecurity risk management. The Cybersecurity Guide to Governance, Risk, and Compliance meets this need with a comprehensive but accessible resource for professionals in every business area. Filled with cutting-edge analysis of the advanced technologies revolutionizing cybersecurity, increasing key risk factors at the same time, and offering practical strategies for implementing cybersecurity measures, it is a must-own for CISOs, boards of directors, tech professionals, business leaders, regulators, entrepreneurs, researchers, and more. The Cybersecurity Guide to Governance, Risk, and Compliance also covers: * Over 1300 actionable recommendations found after each section * Detailed discussion of topics including AI, cloud, and quantum computing * More than 70 ready-to-use KPIs and KRIs "This guide's coverage of governance, leadership, legal frameworks, and regulatory nuances ensures organizations can establish resilient cybersecurity postures. Each chapter delivers actionable knowledge, making the guide thorough and practical." --GARY MCALUM, CISO "This guide represents the wealth of knowledge and practical insights that Jason and Griffin possess. Designed for professionals across the board, from seasoned cybersecurity veterans to business leaders, auditors, and regulators, this guide integrates the latest technological insights with governance, risk, and compliance (GRC)". --WIL BENNETT, CISO
Dr. Jason Edwards, DM, CISSP, CRISC, is an esteemed cybersecurity expert and accomplished industry leader with over 25 years in cybersecurity, risk, and compliance, backed by a specialized doctorate in Cybersecurity Regulatory Risk and Compliance. A prolific educator and influencer, Dr. Edwards contributes as an Adjunct Cyber Professor at multiple universities and is recognized as a leading cybersecurity voice on LinkedIn. His portfolio includes many publications, including the notable Cyber Spear educational newsletter. In addition to his remarkable professional achievements, Dr. Edwards proudly served as a distinguished combat veteran and premier military cyber officer. Griffin Weaver, JD, serves as the Managing Legal Director at a renowned technology company and is also a respected Adjunct Professor specializing in Cybersecurity Law. With a rich background encompassing various technical and managerial roles in IT, Griffin seamlessly transitioned into a flourishing legal career after earning his law degree from the University of Utah. As an acknowledged thought leader, Griffin has enhanced the domain with his scholarly contributions through numerous articles. He is a sought-after speaker renowned for his insightful presentations at cybersecurity conferences.
Inhaltsangabe
Purpose of the Book xvii
Target Audience xix
Structure of the Book xxi
Foreword by Wil Bennett xxiii
Foreword by Gary McAlum xxv
Chapter 1 Governance, Risk Management, and Compliance 1
Chapter 2 The Landscape of Cybersecurity 19
Chapter 3 Cybersecurity Leadership: Insights and Best Practices 33
Chapter 4 Cybersecurity Program and Project Management 53
Chapter 5 Cybersecurity for Business Executives 69
Chapter 6 Cybersecurity and the Board of Directors 87