Practical Guidance
Time-saving Solutions
Knowledgeable Insights

Cybersecurity Resilience Planning Handbook

Select a format

Print Book :1 volume, softbound
ISBN: 9781522115472
In Stock
Price
$316.00
QTY
eBook :epub
ISBN: 9781522115489
In Stock
Price
$316.00
QTY
eBook :mobi
ISBN: 9781522115489
In Stock
Price
$316.00
QTY
International Order Inquiry

Product details

The first step in protecting your organization from cyber attack is to develop a plan for its defense. The Cybersecurity Resilience Planning Handbook provides guidance for executive management, corporate counsel, IT management, and security administrators to help them understand cyber threats and build more secure and resilient systems.

The Handbook offers practical tools and expert guidance for assessing and monitoring vulnerabilities to cyber attack and a step-by-step process for developing a cybersecurity plan that complies with legal obligations and satisfies regulatory and statutory requirements. It can be used as a cybersecurity "best practices" guide because it provides a wider perspective on cybersecurity in general for a better understanding of how to reduce and manage the risks. A detailed cybersecurity implementation plan is included to make the planning process both effective and efficient.

In addition to print and eBook formats, LexisNexis offers access to the Cybersecurity Resilience Planning Handbook online through LexisAdvance® and as part of the LexisNexis Digital Library.

Authors / Contributors

Table of Contents

Part I. Identification of Cyber Assets, Services, and Risks

Chapter 1: Introduction to Cybersecurity

Chapter 2: Cybersecurity Laws, Standards, and Frameworks

Chapter 3: Types of Cyber Attacks

Chapter 4: Cybersecurity Technologies

Chapter 5: Cybersecurity Governance

Chapter 6: Risk Management



Part II. Protection from Cyber Threats

Chapter 7: Physical Security

Chapter 8: Authentication and Authorization

Chapter 9: Network Security and Management

Chapter 10: Host Security and Management

Chapter 11: Data Security

Chapter 12: Management Practices



Part III. Detection of Cyber Attacks

Chapter 13: Cybersecurity Log Management

Chapter 14: Cybersecurity Continuous Monitoring

Chapter 15 External Service Providers

Chapter 16: Cybersecurity Assessments



Part IV. Responding to Cyber Incidents

Chapter 17: Cyber Incident Response Planning

Chapter 18: Forensic Techniques



Part V. Recovering from Cyber Attacks

Chapter 19: Backup and Recovery

Chapter 20: Business Continuity Planning and Management



Part VI. Working Materials

Chapter 21: Explanation of Cybersecurity and Cyber Technology Terms

Chapter 22: Cybersecurity Resilience Implementation Plan