Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Acknowledgements
Preface
Introduction
Chapter 10 – Finding Talent and Developing Your Team
Introduction
Talent, Skills and Training – Bonney
Talent and the Human Element
Recruitment
Scarcity of Qualified Workers
Enough Admiring the Problem. What Are We Going to Do About It?
Investing for the Long Term
Hiring Who You Need
Practical Steps to Take
Third-Party Service Delivery
Augmentation Using Artificial Intelligence
The Skills Gap – Stamper
Cyber Is So Broad
Key Variables that Impact Recruiting Cyber Talent
CISOs and How They Build, Manage and Keep Their Teams – Hayslip
Workforce Planning
Fierce Competition for Talent
What Skills Do We Need to Succeed?
Motivating Cybersecurity Professionals
How Do We Know We’re Effective?
Summary
Chapter 11 – Cyber Awareness Training: It Takes an Organization
Introduction
Education – Bonney
The Carrot and the Stick
Awareness, Self-Defense and a Shared Sense of Purpose
Historical Role Models
The Critical Role of Security Awareness with Executive Management – Stamper
Doesn’t Every Executive Value Cyber?
It’s About the People
Use the Language of Business
Addressing Risk with Rigor
How CISOs Use Cyber Hygiene to Protect and Educate Their Organization – Hayslip
Common Sense Hygiene
Learning from Mistakes
Who Is Being Disrupted?
Does Training Really Work?
Organizational Cyber-Awareness Is Fundamental
How Do You respond in a Crisis?
Summary
Chapter 12 – Monitoring Your Environment
Introduction
Monitoring – Bonney
Needle in a Haystack
We Can No Longer Rely on the Castle and Moat Defense
What Should You Be Looking For?
Don’t Bring a Knife to a Gunfight
Security Program Monitoring – Stamper
Broaden Your Approach to Monitoring
Security Program Governance Monitoring
Monitoring the Enterprise and Your Cybersecurity Program – Hayslip
Continuous Scanning, Monitoring, and Remediation
You Must Secure the Applications
The Metrics Data You Should Collect
Summary
Chapter 13 – Threat Intelligence
Introduction
Situational Awareness – Bonney
What Is Threat Intelligence?
Threat Intelligence Is More Than a Service
Good Follow-up Is Essential
The Human Network
Six Keys to Threat Intelligence
How to Build a Program
Threat Intelligence: The Strategic Resource Providing Clarity to Organizations’ Cybersecurity Programs – Hayslip
Indications Are, You’ve Been Compromised
Sources of Intel
Summary
Chapter 14 – Continuity Planning and Your Approach to Backups
Introduction
Backups and Planning – Bonney
What Business Processes Are You Trying to Protect?
Your Backup Strategy
Plan to Defend Your Backups
Cybersecurity’ Debt to the Business Continuity Community – Stamper
Defining, Documenting, and Mitigating Risk
Tying Risk to the Organization’s Core Priorities and Organizational Objectives
Keeping Executive Management and the Board of Directors Adequately Informed
Business Continuity Planning: A strategic Process That Must Include the CISO – Hayslip
Cyber Incidents Have Far-Ranging Impacts
Leveraging the BCP and DRP for Cyber Resilience
Summary
Chapter 15 – Incident Response and Communication
Introduction
Incident Response and Incident Communications – Bonney
Preparation is Key
Communication is Essential
Incident Response – It’s All About Muscle Memory – Stamper
IT and OT Convergence: The Game Has Changed
Incident Response Is a Team Sport
Know Your Obligations
Determine and Validate Response Priorities
Document the Obvious
Muscle Memory is Key
Automate Key Functions
Incident Response – a CISO’s Best Friend – Hayslip
It’s About the Business
How Incident Response Adds Value
Building Your Incident Response Program
Measure Your Performance
Summary
Chapter 16 – Recovery and Resuming Operations
Introduction
Getting Back to Business – Bonney
Planning and Preparation
Recover and Resume
Validation
Monitoring
Communicating
Don’t Let a Breach Be a Career Killer – Stamper
Hypothetical Healthcare Provider
Benefitting from Your Planning
The Breach Scenario Unfolds
Data Breach Management – Hayslip
Preparing for a Breach
Putting the Puzzle Together
Building Your Own Audit Trail
Never Stop Learning
Don’t Forget to Document the Costs
Summary
Chapter 17 – The Aftermath: Forensics and the Value of Post-Mortem Reviews
Introduction
Forensics and Post-Mortem – Bonney
The Purpose of Forensics
Rules of Evidence
Determine What Happened
Post-Mortem Review
Planning for Forensic Investigations – Stamper
Preparing for a Forensic Analysis
Five Stages of a Forensic Process
Why Digital Forensics Is a Valuable Service to the CISO – Hayslip
Digital Forensics Is Becoming a Strategic Service
Digital Forensics Methods
Building a Forensics Capability
Staffing a Forensics Lab
Summary
Chapter 18 – Building Your Strategic Plan
Introduction
Strategic Plan – Bonney, Hayslip & Stamper
How Did I Get into This?
Structure of Your Strategic Plan
Developing Your Plan
In-source “Build from Scratch”
Out-source “Vendor and Supplier Due Diligence”
CISO, Govern Thyself
Summary
Conclusion
Glossary
Bibliography
About the Authors
Notes
← Prev
Back
Next →
← Prev
Back
Next →