Cybersecurity Resilience Planning Handbook

One of the most effective tools for mitigating cybersecurity risks to your business is a robust, enterprise-wide plan. How your organization reacts to a cyber event can make the difference between secure and continuous business operations and huge financial and reputational damage. The Handbook delivers a cybersecurity planning process that focuses on cyber risks and helps you protect your vital assets and systems.
Publisher: Matthew Bender

Select a format

Print Book :1 volume, softbound
ISBN: 9781522115472
In Stock
eBook :epub
ISBN: 9781522115489
In Stock
Best value
eBook :mobi
ISBN: 9781522115489
In Stock
Best value
International Order Inquiry

Product details

The first step in protecting your organization from cyber attack is to develop a plan for its defense. The Cybersecurity Resilience Planning Handbook provides guidance for executive management, corporate counsel, IT management, and security administrators to help them understand cyber threats and build more secure and resilient systems.

The Handbook offers practical tools and expert guidance for assessing and monitoring vulnerabilities to cyber attack and a step-by-step process for developing a cybersecurity plan that complies with legal obligations and satisfies regulatory and statutory requirements. It can be used as a cybersecurity "best practices" guide because it provides a wider perspective on cybersecurity in general for a better understanding of how to reduce and manage the risks. A detailed cybersecurity implementation plan is included to make the planning process both effective and efficient.

eBooks, CDs, downloadable content, and software purchases are non-cancellable, nonrefundable and nonreturnable. Click here for more information about LexisNexis eBooks. The eBook versions of this title may feature links to Lexis Advance® for further legal research options. A valid subscription to Lexis Advance® is required to access this content.

Authors / Contributors

Table of Contents

Part I. Identification of Cyber Assets, Services, and Risks

Chapter 1: Introduction to Cybersecurity

Chapter 2: Cybersecurity Laws, Standards, and Frameworks

Chapter 3: Types of Cyber Attacks

Chapter 4: Cybersecurity Technologies

Chapter 5: Cybersecurity Governance

Chapter 6: Risk Management

Part II. Protection from Cyber Threats

Chapter 7: Physical Security

Chapter 8: Authentication and Authorization

Chapter 9: Network Security and Management

Chapter 10: Host Security and Management

Chapter 11: Data Security

Chapter 12: Management Practices

Part III. Detection of Cyber Attacks

Chapter 13: Cybersecurity Log Management

Chapter 14: Cybersecurity Continuous Monitoring

Chapter 15 External Service Providers

Chapter 16: Cybersecurity Assessments

Part IV. Responding to Cyber Incidents

Chapter 17: Cyber Incident Response Planning

Chapter 18: Forensic Techniques

Part V. Recovering from Cyber Attacks

Chapter 19: Backup and Recovery

Chapter 20: Business Continuity Planning and Management

Part VI. Working Materials

Chapter 21: Explanation of Cybersecurity and Cyber Technology Terms

Chapter 22: Cybersecurity Resilience Implementation Plan