Summary

  • Explains in easy-to-understand terms what executives and senior managers need to know and do about the ever-changing cyber threat landscape.
  • Gives strategic, business-focused guidance and advice relevant to C-suite executives.
  • Provides an effective and efficient framework for managing cyber governance, risk and compliance.
  • Explains what is required to implement an effective cyber security strategy.

Description

With high-profile cyber attacks, data breaches and fines for GDPR (General Data Protection Regulation) non-compliance hitting the headlines daily, businesses must protect themselves and their reputations, while reassuring stakeholders they take cyber security seriously.

Cyber attacks are becoming more sophisticated and prevalent, and the cost of data breaches is soaring. In addition, new regulations and reporting requirements make cyber security a critical business issue.

Board members and senior management must understand the threat landscape and the strategies they can employ to establish, implement and maintain effective cyber resilience throughout their organisation.

How Cyber Security Can Protect your Business – A guide for all stakeholders provides an effective and efficient framework for managing cyber governance, risk and compliance, which organisations can adapt to meet their own risk appetite and synchronise with their people, processes and technology. It explains what is meant by governance, risk and compliance, how it applies to cyber security and what is required to implement an effective cyber security strategy.

The pocket guide:

  • Gives readers a greater understanding of cyber governance, risk and compliance;
  • Explains what executives, senior managers and their advisors need to know and do about the ever-changing cyber threat landscape;
  • Provides context as to why stakeholders need to be aware of and in control of their organisation’s cyber risk management and cyber incident response;
  • Gives guidance on building an appropriate and efficient governance framework that enables organisations to demonstrate their cyber approach in a non-technical, strategic, business-focused way;
  • Details an overview process to enable risk assessment, assess existing defence mitigations and provide a framework for developing suitable controls; and
  • Includes a checklist to help readers focus on their higher-priority cyber areas.

Suitable for all managers and executives, this pocket guide will be of interest to non-cyber specialists, including non-executive directors, who may be required to review cyber arrangements. For cyber specialists, it provides an approach for explaining cyber issues in non-jargonistic, business-based language.

Kick-start your journey to becoming cyber secure – buy this pocket guide today!

Les mer

How Cyber Security Can Protect your Business – A guide for all stakeholders provides an effective and efficient framework for managing cyber governance, risk and compliance, which organisations can adapt to meet their own risk appetite and synchronise with their people, processes and technology.

Les mer

Chapter 1: Introduction to Cyber Security GRC

Background to GRC

The three lines of defence model

What is the relevance of GRC to cyber?

Chapter 2: Cyber Security Governance

Introduction and overview

Culture and awareness

Threat and risk awareness

Risk management

Responding to cyber incidents

Cyber SOX

Summary: Key cyber security questions for directors to ask

Chapter 3: Cyber Security Risk Management

Introduction and overview

Risk management scoping

Process and control mapping

Risk assessment

Designing and implementing controls

Testing of controls

Summary and conclusions

Chapter 4: Cyber Risks and Controls

Introduction and overview

Identifying cyber risks and controls

Third-party service providers

Protecting against cyber risks

Access management

Firewalls

Security patching

Vulnerability management

Anti-malware

Security by design

Summary and conclusion

Chapter 5: Responding to an Attack

Introduction and overview

Preparing for cyber attacks

Detecting potential cyber attacks

Security operations centre

IT service helpdesk

Recovery following a cyber attack

Summary

Chapter 6: Cyber Compliance

Overview and introduction

Cyber compliance requirements

IT (or information) security policy

ISO 27001

General Data Protection Regulation

Network and Information Systems (NIS) requirements

Payment Card Industry Data Security Standard

Sarbanes-Oxley Act

Third-party compliance

Cyber insurance policy clauses

Summary

References

Further Reading

Les mer
<strong>Understand how a strategic approach to cyber security can benefit your organisation</strong>

Produktdetaljer

ISBN
9781787781955
Publisert
2019-11-26
Utgiver
Vendor
IT Governance Publishing
Vekt
64 gr
Høyde
111 mm
Bredde
178 mm
Dybde
5 mm
Aldersnivå
P, 06
Språk
Product language
Engelsk
Format
Product format
Heftet
Antall sider
74

Narrator

Biographical note

Chris Wright is a qualified accountant and CISA (certified information systems auditor) with more than 30 years’ experience providing financial and IT advisory and risk management services. He worked for 16 years at KPMG, where he managed a number of IT due diligence reviews and was head of information risk training in the UK. He has also worked in a wide range of industry sectors, including oil and gas, small and medium enterprises, public sector, aviation and travel.