Developing Cybersecurity Programs and Policies eBook : 9780134858548

Developing Cybersecurity Programs and Policies eBook

Published by
Pearson Higher Ed USA
Title type
NZ/Pacific customers only
This eText can only be purchased by people residing in New Zealand, Fiji, Samoa, Tonga or Cook Islands with a credit card from the same country. Click here to find the Pearson website for your region.

Digital Access Code: When you buy an eBook you will receive an email with your unique redemption code code. Simply go to VitalSource Bookshelf to download the FREE Bookshelf software. After installation, enter your redemption code for your eBook.

Please note: eBooks are available for download immediately and cannot be returned once purchased.

About the book: This book is a complete guide to establishing a cybersecurity program and governance in your organisation. In this book, you will learn how to create cybersecurity policies, standards, procedures, guidelines, and plans —and the differences among them. This book covers the Confidentiality, Integrity & Availability (CIA) security model. You will also learn how threat actors are launching attacks against their victims compromising confidentiality, integrity, and availability of systems and networks. This book covers the NIST Cybersecurity Framework and ISO/IEC 27000-series standards. You will learn how to align security with business strategy, as well as define, inventory, and classify your information and systems.

This book teaches you how to systematically identify, prioritise, and manage cybersecurity risks and reduce social engineering (human) risks with role-based Security Education, Awareness, and Training (SETA). You will also learn how to implement effective physical, environmental, communications, and operational security; and effectively manage access control. In this book you will learn how to respond to incidents and ensure continuity of operations and how to comply with laws and regulations, including GLBA, HIPAA/HITECH, FISMA, state data security and notification rules, and PCI DSS.

The full text downloaded to your computer. With VitalSource eBooks you can:

  • search for key concepts, words and phrases
  • make highlights and notes as you study
  • share your notes with friends

The eBook is downloaded to your computer and accessible either offline through the VitalSource Bookshelf, available online and also via the iPad/Android app.

Time Limit: This VitalSource eBook does not have an expiry date. You will continue to access your eBook whilst you have your VitalSource Bookshelf installed.

Table of contents
  • Chapter 1. Understanding Cybersecurity Policy and Governance
  • Chapter 2. Cybersecurity Policy Organization, Format and Styles
  • Chapter 3. Cybersecurity Framework
  • Chapter 4. Governance and Risk Management
  • Chapter 5. Asset Management and Data Loss Prevention
  • Chapter 6. Human Resources Security
  • Chapter 7. Physical and Environmental Security
  • Chapter 8. Communications and Operations Security
  • Chapter 9. Access Control Management
  • Chapter 10. Information Systems Acquisition, Development, and Maintenance
  • Chapter 11. Cybersecurity Incident Response
  • Chapter 12. Business Continuity Management
  • Chapter 13. Regulatory Compliance for Financial Institutions
  • Chapter 14. Regulatory Compliance for the Healthcare Sector
  • Chapter 15. PCI Compliance for Merchants
  • Appendix A. Information Security Program Resources
  • Appendix B. Sample Information Security Policy
  • Appendix C. Information Systems Acceptable Use Agreement and Policy
Features & benefits
  • The in-depth, up-to-the-minute guide to information security policy for every practitioner and advanced student
  • In-depth coverage of information security policy from definition, psychology, standard frameworks, and creating a culture of compliance
  • Thorough coverage of Security Education, Training & Awareness (SETA)
  • Appendices include: Employee Affirmation Statement and Resources for Security Professionals
Author biography

Omar Santos is a principal engineer in the Cisco Product Security Incident Response Team (PSIRT) within the Cisco Security Research and Operations. He mentors and leads engineers and incident managers during the investigation and resolution of security vulnerabilities in all Cisco products, including cloud services. Omar has been working with information technology and cybersecurity since the mid-1990s. Omar has designed, implemented, and supported numerous secure networks for Fortune 100 and 500 companies and the U.S. government. Prior to his current role, he was a technical leader within the World-Wide Security Practice and the Cisco Technical Assistance Center (TAC), where he taught, led, and mentored many engineers within both organizations.

Omar is an active member of the security community, where he leads several industrywide initiatives and standard bodies. His active role helps businesses, academic institutions, state and local law enforcement agencies, and other participants that are dedicated to increasing the security of the critical infrastructure.



Access Code info.

To get the most out of your eBook you need to download the VitalSource Bookshelf software. This software is free to download and use. View the VitalSource Bookshelf system requirements here.

Download Information: Once purchased, you can view and/or download your eBook instantly, either via the download link which you will receive as soon as you complete your online order or by viewing the download link against the order in the My Account area of this website.

Please note: eBooks are available for download immediately and cannot be returned once purchased.