Book description
This book gives you a stark and timely analysis of the hostile online landscape that today's corporate systems inhabit, providing CIOs and IT professionals with a practical introduction to the defensive strategies that you can be employed in response.
Table of contents
- Copyright
- Preface
- About the Author
- Introduction
- 1. What Technology Giveth It Taketh Away
- 2. CyberAttack: It’s a Dangerous World for Information Systems
- 3. The Human Factor: The Underrated Threat
- 4. Transition from an Environment of ‘FUD’ to a Standards-Based Environment
- 5. Establishing a Culture of CyberSecurity
- 6. Increasing Internationalism: Governance, Laws, and Ethics
- 7. Standards: What Are They and Why Should We Care?
-
8. From CyberWar to CyberDefence: Applying Standards in an Environment of Change and Danger
- Moving beyond compliance and reaction
- A quick look at relevant standards
-
Take four steps forward
-
Step One: Plan
- One: Establish cybersecurity governance – think in boardroom terms
- Information Security Governance: Guidance for Boards of Directors and Executive Management.
-
Two: Execute risk assessment – what is the tolerance for risk?
- 1. Identify Information System Characteristics
- 2. Identify Potential & Certain Threats
- 3. Identify Potential & Certain Vulnerabilities
- 4. Determine Likelihood
- 5. Identify Potential Business Impacts
- 6. Determine Unmitigated Risk
- 7. Identify Existing Controls and Countermeasures
- 8. Determine Residual Risk
- 9. Make Controls Recommendations
- Three: Develop cybersecurity strategy and plan – create a standards roadmap
- Four: Implement risk management
- Five: Identify security metrics and benchmarks – measures of success
- Step Two: Do
- Step Three: Check
- Step Four: Act
-
Step One: Plan
- The future is ‘ROSI’
- References
- Making the case for cybersecurity assurance
- References
- 9. Conclusion: Where Do We Go From Here?
- 1. Gap Analysis Areas of Interest
- 2. Standards Crosswalk
- Definitions
- Acronyms
- ITG Resources
Product information
- Title: CyberWar, CyberTerror, CyberCrime: A Guide to the Role of Standards in an Environment of Change and Danger
- Author(s):
- Release date: April 2009
- Publisher(s): IT Governance Publishing
- ISBN: 9781905356478
You might also like
book
Cyber-Vigilance and Digital Trust
Cyber threats are ever increasing. Adversaries are getting more sophisticated and cyber criminals are infiltrating companies …
book
EU GDPR & EU-U.S. Privacy Shield: A pocket guide, second edition
This concise guide is essential reading for US organizations wanting an easy to follow overview of …
book
CyberWar, CyberTerror, CyberCrime and CyberActivism, 2nd Edition
Successful cyberattacks can damage your organisation, no matter who is behind them The goals of the …
book
Stuff I Wish I'd Known When I Started Working
Don't learn the hard way—get work advice from some of the world's most successful people, all …