Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Acknowledgements
Preface
How to Use This Book
Introduction
Chapter 1 – The CISO
Introduction
Report To and Organizational Structure –Bonney
CISO Reporting Structure – Stamper
The Role of The CISO – Hayslip
Summary
Chapter 2 – Regulatory, Compliance and Audit
Introduction
Regulatory Requirements and Audit – Bonney
Legal and Regulatory Impacts of Cybersecurity – Stamper
Regulatory and Compliance – Hayslip
Summary
Chapter 3 – How Data and Information Classification Influence the Role of the CISO
Introduction
Identifying Sensitive Data – Bonney
Data Mapping – Stamper
Securing and Classifying Data – Hayslip
Summary
Chapter 4 – Third Party Risk
Introduction
Third Parties and Vendors – Bonney
Third Party Risk – Stamper
Vendor Management Program – Hayslip
Summary
Chapter 5 – Measurement and Reporting
Introduction
Measuring and Reporting – Bonney
Cybersecurity Metrics – Stamper
Metrics, Dashboards, and Reports – Hayslip
Summary
Chapter 6 – Management and the Board
Introduction
Management and the Board – Bonney
Board Requirements – Stamper
Management and the Board of Directors – Hayslip
Summary
Chapter 7 – Risk Management and Cyber Liability Insurance
Introduction
Risk Management Techniques – Bonney
Cyber Liability Insurance – Stamper
Cyber Insurance – Hayslip
Summary
Chapter 8 – Tools and Techniques
Introduction
Tools and Techniques – Bonney
Cyber Tools and Techniques – Stamper
Cybersecurity Tools and Techniques – Hayslip
Summary
Chapter 9 – Security Policy
Introduction
Security Policy – Bonney
Security Policies – Stamper
Cybersecurity Policies and Plans – Hayslip
Summary
Conclusion
Appendix
End Notes
Glossary
Bibliography
About the Authors
← Prev
Back
Next →
← Prev
Back
Next →