Cybersecurity readiness : a holistic and high-performance approach /: a holistic and high-performance approach. (2021)
- Record Type:
- Book
- Title:
- Cybersecurity readiness : a holistic and high-performance approach /: a holistic and high-performance approach. (2021)
- Main Title:
- Cybersecurity readiness : a holistic and high-performance approach
- Further Information:
- Note: Dave Chatterjee.
- Authors:
- Chatterjee, Dave
- Contents:
- Preface; Foreword; Endorsements; Acknowledgments; About the Author; Chapter 1. Introduction: The Challenge of Cybersecurity; Chapter 2. The Cyberattack Epidemic; 2.1 Expanding Hardware and Software Attack Surfaces; 2.2 The Human Vulnerability Factor; 2.3 Growing Attack Vectors; 2.4 Nature and Extent of Impact; Chapter 3. Breach Incidents and Lessons Learned; 3.1 The Capital One Breach That Exposed 100 Million Applicants and Customer Information; 3.2 British Airways Ordered to Pay a Record Fine of $230 Million; 3.3 Target Retail Chain Experiences an External Intrusion That Compromised Millions of Customers’ Data; 3.4 Adult Friend Finder Site Breach Exposes Millions of Customer Records; 3.5 Three Billion Yahoo User Accounts Compromised; 3.6 Equifax Data Breach Exposes Millions of Customers’ Data; 3.7 Adobe Breach Exposes 38 Million Customer Records; 3.8 Anthem Breach Affects 78.8 Million People; Chapter 4. Foundations of the High-Performance Information Security Culture Framework; 4.1 Organizational Culture and Firm Performance; 4.2 Organizational Culture and Cybersecurity; 4.3 High-Reliability Organizational Culture Traits; Chapter 5. Commitment; 5.1 Hands-On Top Management; 5.2 “We-Are-in-It-Together” Culture; 5.3 Cross-Functional Participation; 5.4 Sustainable Budget; 5.5 Strategic Alignment and Partnerships; 5.6 Joint Ownership and Accountability; 5.7 Empowerment; Chapter 6. Preparedness; 6.1 Identify; 6.2 Protect; 6.3 Detect; 6.4 Respond and Recover; Chapter 7.Preface; Foreword; Endorsements; Acknowledgments; About the Author; Chapter 1. Introduction: The Challenge of Cybersecurity; Chapter 2. The Cyberattack Epidemic; 2.1 Expanding Hardware and Software Attack Surfaces; 2.2 The Human Vulnerability Factor; 2.3 Growing Attack Vectors; 2.4 Nature and Extent of Impact; Chapter 3. Breach Incidents and Lessons Learned; 3.1 The Capital One Breach That Exposed 100 Million Applicants and Customer Information; 3.2 British Airways Ordered to Pay a Record Fine of $230 Million; 3.3 Target Retail Chain Experiences an External Intrusion That Compromised Millions of Customers’ Data; 3.4 Adult Friend Finder Site Breach Exposes Millions of Customer Records; 3.5 Three Billion Yahoo User Accounts Compromised; 3.6 Equifax Data Breach Exposes Millions of Customers’ Data; 3.7 Adobe Breach Exposes 38 Million Customer Records; 3.8 Anthem Breach Affects 78.8 Million People; Chapter 4. Foundations of the High-Performance Information Security Culture Framework; 4.1 Organizational Culture and Firm Performance; 4.2 Organizational Culture and Cybersecurity; 4.3 High-Reliability Organizational Culture Traits; Chapter 5. Commitment; 5.1 Hands-On Top Management; 5.2 “We-Are-in-It-Together” Culture; 5.3 Cross-Functional Participation; 5.4 Sustainable Budget; 5.5 Strategic Alignment and Partnerships; 5.6 Joint Ownership and Accountability; 5.7 Empowerment; Chapter 6. Preparedness; 6.1 Identify; 6.2 Protect; 6.3 Detect; 6.4 Respond and Recover; Chapter 7. Discipline; 7.1 Information Security Governance Policy; 7.2 Communications and Enforcement of Policies; 7.3 Continuous Monitoring; 7.4 Continuous Performance Assessment and Improvement; 7.5 Security Audits and Drills; 7.6 Penetration Testing and Red Team Exercises; Chapter 8. Key Messages and Actionable Recommendations; 8.1 Commitment; 8.2 Preparedness; 8.3 Discipline; Appendix 1 Information Security Monitoring Controls; Appendix 2 Cybersecurity Performance Measures; Appendix 3A Cybersecurity Readiness Scorecard: Commitment; Appendix 3B Cybersecurity Readiness Scorecard: Preparedness; Appendix 3C Cybersecurity Readiness Scorecard: Discipline; Appendix 4 Cybersecurity and Privacy Laws and Regulations; Appendix 5 Physical, Technical, and Administrative Controls: A Representative List; Appendix 6 Case Studies; Cybersecurity Resources; Index; … (more)
- Edition:
- 1st
- Publisher Details:
- Los Angeles : SAGE
- Publication Date:
- 2021
- Extent:
- 1 online resource
- Subjects:
- 005.8
Computer security
Business enterprises -- Security measures
Electronic information resources -- Access control
Risk management
Computer crimes -- Prevention
Preparedness - Languages:
- English
- ISBNs:
- 9781071837344
- Related ISBNs:
- 9781071837337
- Notes:
- Note: Includes bibliographical references and index.
Note: Description based on CIP data; resource not viewed. - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.601990
- Ingest File:
- 04_078.xml