Cybersecurity Resilience Planning Handbook
Select a format
Select subscription type
Terms & conditions
Subscribers receive the product(s) listed on the Order Form and any Updates made available during the annual subscription period. Shipping and handling fees are not included in the annual price.
Subscribers are advised of the number of Updates that were made to the particular publication the prior year. The number of Updates may vary due to developments in the law and other publishing issues, but subscribers may use this as a rough estimate of future shipments. Subscribers may call Customer Support at 800-833-9844 for additional information.
Subscribers may cancel this subscription by: calling Customer Support at 800-833-9844; emailing email@example.com; or returning the invoice marked "CANCEL".
If subscribers cancel within 30 days after the product is ordered or received and return the product at their expense, then they will receive a full credit of the price for the annual subscription.
If subscribers cancel between 31 and 60 days after the invoice date and return the product at their expense, then they will receive a 5/6th credit of the price for the annual subscription. No credit will be given for cancellations more than 60 days after the invoice date. To receive any credit, subscriber must return all product(s) shipped during the year at their expense within the applicable cancellation period listed above.
The total price includes the product(s) listed in the Order Form and any Updates for a limited period (minimum period of 30 days) after the order is placed ("Order Window"). Shipping and handling fees are not included in the grand total price.
All shipments may be returned, at subscribers' expense, for full credit of the Price within 30 days of receipt.
Shipments may not be returned, and no credits will be issued, more than 30 days after receipt.
After the Order Window, subscribers will receive notice of Updates along with the then-current grand total price and order process as Updates become available. Subscribers will only be shipped those Updates they specifically request.
View a sample of this title using the ReadNow feature
The first step in protecting your organization from cyber attack is to develop a plan for its defense. The Cybersecurity Resilience Planning Handbook, Second Edition, provides guidance for executive management, corporate counsel, IT management, and security administrators to help them understand cyber threats and build more secure and resilient systems.
The Handbook risks. A detailed cybersecurity implementation plan is included to make the planning process both effective and efficient. The new, expanded Second Edition of the Handbook now offers more than 150 workflow tools – including risk assessment worksheets, checklists, forms, and policies – to help you build out and improve your cybersecurity program to meet cyber threats and challenges as they develop.
Additionally, this handbook is accompanied by a downloadable Folio Infobase available through an account on the LexisNexis Store. The Infobase allows you to search the contents of the handbook and easily export the Cybersecurity Plan and all of the exhibits, worksheets, and sample policies to support your cybersecurity planning and documentation needs.
eBooks, CDs, downloadable content, and software purchases are noncancelable, nonrefundable and nonreturnable. Click here for more information about LexisNexis eBooks. The eBook versions of this title may feature links to Lexis+® for further legal research options. A valid subscription to Lexis+® is required to access this content.
Table of contents
Part I. Identification of Cyber Assets, Services, and Risks
Chapter 1: Introduction to Cybersecurity
Chapter 2: Cybersecurity Laws, Standards, and Frameworks
Chapter 3: Types of Cyber Attacks
Chapter 4: Cybersecurity Technologies
Chapter 5: Cybersecurity Governance
Chapter 6: Risk Management
Part II. Protection from Cyber Threats
Chapter 7: Physical Security
Chapter 8: Authentication and Authorization
Chapter 9: Network Security and Management
Chapter 10: Host Security and Management
Chapter 11: Data Security
Chapter 12: Management Practices
Part III. Detection of Cyber Attacks
Chapter 13: Cybersecurity Log Management
Chapter 14: Cybersecurity Continuous Monitoring
Chapter 15: External Service Providers
Chapter 16: Cybersecurity Assessments
Part IV. Responding to Cyber Incidents
Chapter 17: Cyber Incident Response Planning
Chapter 18: Forensic Techniques
Part V. Recovering from Cyber Attacks
Chapter 19: Backup and Recovery
Chapter 20: Business Continuity Planning and Management
Part VI. Appendices
Appendix A: Explanation of Cybersecurity and Cyber Technology Terms
Appendix B: Cybersecurity Resilience Implementation Plan