Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases now! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Resilient Cybersecurity

You're reading from   Resilient Cybersecurity Reconstruct your defense strategy in an evolving cyber world

Arrow left icon
Product type Paperback
Published in Sep 2024
Publisher Packt
ISBN-13 9781835462515
Length 752 pages
Edition 1st Edition
Arrow right icon
Author (1):
Arrow left icon
Mark Dunkerley Mark Dunkerley
Author Profile Icon Mark Dunkerley
Mark Dunkerley
Arrow right icon
View More author details
Toc

Table of Contents (19) Chapters Close

Preface 1. Current State FREE CHAPTER 2. Setting the Foundations 3. Building Your Roadmap 4. Solidifying Your Strategy 5. Cybersecurity Architecture 6. Identity and Access Management 7. Cybersecurity Operations 8. Vulnerability Management 9. User Awareness, Training, and Testing 10. Vendor Risk Management 11. Proactive Services 12. Operational Technology and the Internet of Things 13. Governance Oversight 14. Managing Risk 15. Regulatory and Compliance 16. Some Final Thoughts 17. Other Books You May Enjoy
18. Index

Who this book is for

This book focuses on cybersecurity from a program level in which the following roles who build the strategy and execute the program will primarily benefit from reading:

  • CISO/CSO
  • Other C-Level or executive leaders who overlook cybersecurity
  • Directors overlooking cybersecurity
  • Program Managers

With this book providing insight into all functions of a cybersecurity program, those who work within cybersecurity and help run the program will benefit from understanding what a comprehensive cybersecurity program involves. This will help provide a better understanding of each of the functions they have to interact with and will enable more productive collaboration across functions:

  • Managers overlooking cybersecurity
  • Architects involved with cybersecurity
  • Engineers involved with cybersecurity
  • Administrators involved with cybersecurity
  • Analysts involved with cybersecurity
  • Project Managers involved with cybersecurity
  • Other roles that are part of the cybersecurity program

In addition, those who are new to cybersecurity or still determining what they would like to do within cybersecurity can also benefit from this book. As you look to enter cybersecurity, it is important you understand everything that is involved and what it takes to run a comprehensive program.

In addition, you will learn what is involved with each of the functions to help with any career decisions you are making.

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €18.99/month. Cancel anytime