Cybersecurity Resilience Planning Handbook

One of the most effective tools for mitigating cybersecurity risks to your business is a robust, enterprise-wide plan. How your organization reacts to a cyber event can make the difference between secure and continuous business operations and huge financial and reputational damage. This Second Edition of the Handbook not only delivers a cybersecurity planning process that helps you protect your vital assets and systems, it also provides the tools you need – over 150 checklists, risk assessments and policies -- to build a comprehensive cybersecurity program upon your plan. The handbook is accompanied by a downloadable Folio Infobase that allows you to search the contents and easily export the tools.
Publisher: Matthew Bender

Select a format

Print Book :1 volume, softbound
2nd Edition
ISBN: 9781522199762
In Stock
eBook :epub
2nd Edition
ISBN: 9781522199779
Estimated: September 08, 2020
eBook :mobi
2nd Edition
ISBN: 9781522199779
Estimated: September 08, 2020
International Order Inquiry

Product details

The first step in protecting your organization from cyber attack is to develop a plan for its defense. The Cybersecurity Resilience Planning Handbook, Second Edition, provides guidance for executive management, corporate counsel, IT management, and security administrators to help them understand cyber threats and build more secure and resilient systems.

The Handbook risks. A detailed cybersecurity implementation plan is included to make the planning process both effective and efficient. The new, expanded Second Edition of the Handbook now offers more than 150 workflow tools – including risk assessment worksheets, checklists, forms, and policies – to help you build out and improve your cybersecurity program to meet cyber threats and challenges as they develop.

Additionally, this handbook is accompanied by a downloadable Folio Infobase available through an account on the LexisNexis Store. The Infobase allows you to search the contents of the handbook and easily export the Cybersecurity Plan and all of the exhibits, worksheets, and sample policies to support your cybersecurity planning and documentation needs.

eBooks, CDs, downloadable content, and software purchases are non-cancellable, nonrefundable and nonreturnable. Click here for more information about LexisNexis eBooks. The eBook versions of this title may feature links to Lexis+™ for further legal research options. A valid subscription to Lexis+™ is required to access this content.

Authors / Contributors

Table of Contents

Part I. Identification of Cyber Assets, Services, and Risks
Chapter 1: Introduction to Cybersecurity
Chapter 2: Cybersecurity Laws, Standards, and Frameworks
Chapter 3: Types of Cyber Attacks
Chapter 4: Cybersecurity Technologies
Chapter 5: Cybersecurity Governance
Chapter 6: Risk Management

Part II. Protection from Cyber Threats
Chapter 7: Physical Security
Chapter 8: Authentication and Authorization
Chapter 9: Network Security and Management
Chapter 10: Host Security and Management
Chapter 11: Data Security
Chapter 12: Management Practices

Part III. Detection of Cyber Attacks
Chapter 13: Cybersecurity Log Management
Chapter 14: Cybersecurity Continuous Monitoring
Chapter 15: External Service Providers
Chapter 16: Cybersecurity Assessments

Part IV. Responding to Cyber Incidents
Chapter 17: Cyber Incident Response Planning
Chapter 18: Forensic Techniques

Part V. Recovering from Cyber Attacks
Chapter 19: Backup and Recovery
Chapter 20: Business Continuity Planning and Management

Part VI. Appendices
Appendix A: Explanation of Cybersecurity and Cyber Technology Terms
Appendix B: Cybersecurity Resilience Implementation Plan