Securing the Enterprise
Securing the Enterprise, Apress
A Practical Guide for CISOs, CXOs, and IT Security Professionals
Von GS Jha, im heise shop in digitaler Fassung erhältlich
Produktinformationen "Securing the Enterprise"
Cybersecurity is no longer just an IT issue; it is a business-critical function
requiring executive oversight and strategic implementation. This book offers a
practical approach to cybersecurity leadership, risk management, and frameworks
such as NIST, MITRE ATT&CK, and Zero Trust.
The book blends executive strategy with hands-on cybersecurity methodologies,
providing a holistic understanding for CXOs, CISOs, and IT security
professionals.
By exploring real-world case studies and breaches, such as SolarWinds and
Colonial Pipeline, this book equips you with proactive defense strategies,
governance insights, and the technical knowledge required to secure enterprise
infrastructures effectively.
What You Will Learn
* Align cybersecurity with business strategy and executive decision making
* Cover practical implementation of frameworks such as NIST CSF, ISO 27001, and
Zero Trust
* Respond to cyber incidents and build a resilient security culture
* Understand key cybersecurity principles, including threat intelligence and
risk management
* Study advanced cybersecurity topics, including AI-driven threats, ransomware,
and cloud security
Who This Book Is For
Cybersecurity professionals, CISOs, CIOs, IT security architects, and risk
managers; plus business executives, Chief Experience Officers (CXOs), board
members, compliance officers, graduate students in cybersecurity
Part 1: Foundations of Cybersecurity.- Chapter 1: Introduction to
Cybersecurity.- Chapter 2: Core Cybersecurity Concepts.- Chapter 3: The Threat
Landscape.- Part 2: The Role of Leaders in Cybersecurity.- Chapter 4: The Role
of CXOs & Executive Leaders.- Chapter 5: The Role of the Board of Directors.-
Chapter 6: The CISO Role & Responsibilities.- Chapter 7: Leadership &
Communication.- Chapter 8: CISO Skills & Competencies.- Part 3: Cybersecurity
Frameworks & Regulations.- Chapter 9: Key Cybersecurity Frameworks.- Chapter 10:
Compliance & Regulations.- Chapter 11: Implementing a Security Program.- Part 4:
Advanced Topics in Cybersecurity.- Chapter 12: Cloud Security.- Chapter 13:
Security Information & Event Management (SIEM).- Chapter 14: AI & Machine
Learning in Cybersecurity.- Chapter 15: IoT Security.- Chapter 16: Blockchain &
Cryptocurrency Security.- Chapter 17: Zero Trust Architecture (ZTA).- Part 5:
Cybersecurity Tabletop Exercises (TTXs) & Case Studies.- Chapter 18:
Cybersecurity Tabletop Exercises (TTXs).- Chapter 19: Notable Cybersecurity
Incidents & Lessons Learned.- Chapter 20: Future of Cybersecurity.- Chapter 21:
Tabletop Exercise - A Critical Tool for Incident Preparedness.- Chapter 22:
David vs. Goliath: Cybersecurity's Constant Struggle.
Artikel-Details
- Anbieter:
- Apress
- Autor:
- GS Jha
- Artikelnummer:
- 9798868816543
- Veröffentlicht:
- 26.09.25