Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Acknowledgements Preface Introduction Chapter 10 – Finding Talent and Developing Your Team
Introduction Talent, Skills and Training – Bonney
Talent and the Human Element Recruitment Scarcity of Qualified Workers Enough Admiring the Problem. What Are We Going to Do About It? Investing for the Long Term Hiring Who You Need Practical Steps to Take Third-Party Service Delivery Augmentation Using Artificial Intelligence
The Skills Gap – Stamper
Cyber Is So Broad Key Variables that Impact Recruiting Cyber Talent
CISOs and How They Build, Manage and Keep Their Teams – Hayslip
Workforce Planning Fierce Competition for Talent What Skills Do We Need to Succeed? Motivating Cybersecurity Professionals How Do We Know We’re Effective?
Summary
Chapter 11 – Cyber Awareness Training: It Takes an Organization
Introduction Education – Bonney
The Carrot and the Stick Awareness, Self-Defense and a Shared Sense of Purpose Historical Role Models
The Critical Role of Security Awareness with Executive Management – Stamper
Doesn’t Every Executive Value Cyber? It’s About the People Use the Language of Business Addressing Risk with Rigor
How CISOs Use Cyber Hygiene to Protect and Educate Their Organization – Hayslip
Common Sense Hygiene Learning from Mistakes Who Is Being Disrupted? Does Training Really Work? Organizational Cyber-Awareness Is Fundamental How Do You respond in a Crisis?
Summary
Chapter 12 – Monitoring Your Environment
Introduction Monitoring – Bonney
Needle in a Haystack We Can No Longer Rely on the Castle and Moat Defense What Should You Be Looking For? Don’t Bring a Knife to a Gunfight
Security Program Monitoring – Stamper
Broaden Your Approach to Monitoring Security Program Governance Monitoring
Monitoring the Enterprise and Your Cybersecurity Program – Hayslip
Continuous Scanning, Monitoring, and Remediation You Must Secure the Applications The Metrics Data You Should Collect
Summary
Chapter 13 – Threat Intelligence
Introduction Situational Awareness – Bonney
What Is Threat Intelligence? Threat Intelligence Is More Than a Service Good Follow-up Is Essential The Human Network
Six Keys to Threat Intelligence How to Build a Program Threat Intelligence: The Strategic Resource Providing Clarity to Organizations’ Cybersecurity Programs – Hayslip
Indications Are, You’ve Been Compromised Sources of Intel
Summary
Chapter 14 – Continuity Planning and Your Approach to Backups
Introduction Backups and Planning – Bonney
What Business Processes Are You Trying to Protect? Your Backup Strategy Plan to Defend Your Backups
Cybersecurity’ Debt to the Business Continuity Community – Stamper
Defining, Documenting, and Mitigating Risk Tying Risk to the Organization’s Core Priorities and Organizational Objectives Keeping Executive Management and the Board of Directors Adequately Informed
Business Continuity Planning: A strategic Process That Must Include the CISO – Hayslip
Cyber Incidents Have Far-Ranging Impacts Leveraging the BCP and DRP for Cyber Resilience
Summary
Chapter 15 – Incident Response and Communication
Introduction Incident Response and Incident Communications – Bonney
Preparation is Key Communication is Essential
Incident Response – It’s All About Muscle Memory – Stamper
IT and OT Convergence: The Game Has Changed Incident Response Is a Team Sport Know Your Obligations Determine and Validate Response Priorities Document the Obvious Muscle Memory is Key Automate Key Functions
Incident Response – a CISO’s Best Friend – Hayslip
It’s About the Business How Incident Response Adds Value Building Your Incident Response Program Measure Your Performance
Summary
Chapter 16 – Recovery and Resuming Operations
Introduction Getting Back to Business – Bonney
Planning and Preparation Recover and Resume Validation Monitoring Communicating
Don’t Let a Breach Be a Career Killer – Stamper
Hypothetical Healthcare Provider Benefitting from Your Planning The Breach Scenario Unfolds
Data Breach Management – Hayslip
Preparing for a Breach Putting the Puzzle Together Building Your Own Audit Trail Never Stop Learning Don’t Forget to Document the Costs
Summary
Chapter 17 – The Aftermath: Forensics and the Value of Post-Mortem Reviews
Introduction Forensics and Post-Mortem – Bonney
The Purpose of Forensics Rules of Evidence Determine What Happened Post-Mortem Review
Planning for Forensic Investigations – Stamper
Preparing for a Forensic Analysis Five Stages of a Forensic Process
Why Digital Forensics Is a Valuable Service to the CISO – Hayslip
Digital Forensics Is Becoming a Strategic Service Digital Forensics Methods Building a Forensics Capability Staffing a Forensics Lab
Summary
Chapter 18 – Building Your Strategic Plan
Introduction Strategic Plan – Bonney, Hayslip & Stamper
How Did I Get into This? Structure of Your Strategic Plan Developing Your Plan In-source “Build from Scratch” Out-source “Vendor and Supplier Due Diligence” CISO, Govern Thyself
Summary
Conclusion Glossary Bibliography About the Authors Notes
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion