Cybersecurity Resilience Planning Handbook

One of the most effective tools for mitigating cybersecurity risks to your business is a robust, enterprise-wide plan. How your organization reacts to a cyber event can make the difference between secure and continuous business operations and huge financial and reputational damage. The Handbook delivers a cybersecurity planning process that focuses on cyber risks and helps you protect your vital assets and systems.
Publisher: Matthew Bender
eBook :epub
$335.00
Quantity
In Stock
ISBN: 9781522115489
Publisher: Matthew Bender
International Order Inquiry
Book Edition: 1

Product details

The first step in protecting your organization from cyber attack is to develop a plan for its defense. The Cybersecurity Resilience Planning Handbook provides guidance for executive management, corporate counsel, IT management, and security administrators to help them understand cyber threats and build more secure and resilient systems.

The Handbook offers practical tools and expert guidance for assessing and monitoring vulnerabilities to cyber attack and a step-by-step process for developing a cybersecurity plan that complies with legal obligations and satisfies regulatory and statutory requirements. It can be used as a cybersecurity "best practices" guide because it provides a wider perspective on cybersecurity in general for a better understanding of how to reduce and manage the risks. A detailed cybersecurity implementation plan is included to make the planning process both effective and efficient.

In addition to print and eBook formats, LexisNexis offers access to the Cybersecurity Resilience Planning Handbook online through LexisAdvance® and as part of the LexisNexis Digital Library.

Featured Authors

Table of Contents

Part I. Identification of Cyber Assets, Services, and Risks

Chapter 1: Introduction to Cybersecurity

Chapter 2: Cybersecurity Laws, Standards, and Frameworks

Chapter 3: Types of Cyber Attacks

Chapter 4: Cybersecurity Technologies

Chapter 5: Cybersecurity Governance

Chapter 6: Risk Management



Part II. Protection from Cyber Threats

Chapter 7: Physical Security

Chapter 8: Authentication and Authorization

Chapter 9: Network Security and Management

Chapter 10: Host Security and Management

Chapter 11: Data Security

Chapter 12: Management Practices



Part III. Detection of Cyber Attacks

Chapter 13: Cybersecurity Log Management

Chapter 14: Cybersecurity Continuous Monitoring

Chapter 15 External Service Providers

Chapter 16: Cybersecurity Assessments



Part IV. Responding to Cyber Incidents

Chapter 17: Cyber Incident Response Planning

Chapter 18: Forensic Techniques



Part V. Recovering from Cyber Attacks

Chapter 19: Backup and Recovery

Chapter 20: Business Continuity Planning and Management



Part VI. Working Materials

Chapter 21: Explanation of Cybersecurity and Cyber Technology Terms

Chapter 22: Cybersecurity Resilience Implementation Plan