The cybersecurity control playbook : from fundamentals to advanced strategies

"This book is an essential resource for anyone looking to protect their organization in the digital age; whether running a small business, managing a medium-sized company, or leading a large corporation, this book contains strategies that will fit all needs. Written in a highly accessible, jarg...

Full description

Saved in:
Bibliographic Details
Main Author Edwards, Jason (Cybersecurity expert) (Author)
Format Electronic eBook
LanguageEnglish
Published Hoboken, NJ : Wiley, 2025.
Subjects
Online AccessFull text
ISBN9781394331888
9781394331864
9781394331871
9781394331857
Physical Description1 online zdroj (xxvii, 510 stran) : ilustrace

Cover

LEADER 00000cam a2200000 i 4500
001 115234
003 CZ-ZlUTB
005 20260227141626.0
006 m o d
007 cr cnu---unuuu
008 250225t20252025njua o 001 0 eng
040 |a DLC  |b eng  |e rda  |c DLC  |d YDX  |d OCLCO  |d DG1  |d N$T  |d ORMDA  |d CLOUD  |d UKAHL  |d UKMGB  |d HOPLA 
020 |a 9781394331888  |q (electronic book) 
020 |a 9781394331864  |q (electronic book) 
020 |a 9781394331871  |q (electronic bk.) 
020 |z 9781394331857  |q (hardcover) 
024 8 |a CIPO000218335 
035 |a (OCoLC)1507733709  |z (OCoLC)1518927920 
042 |a pcc 
100 1 |a Edwards, Jason  |c (Cybersecurity expert),  |e author.  |4 aut 
245 1 4 |a The cybersecurity control playbook :  |b from fundamentals to advanced strategies /  |c Jason Edwards, Amazon, Cibolo, TX, US. 
264 1 |a Hoboken, NJ :  |b Wiley,  |c 2025. 
264 4 |c ©2025 
300 |a 1 online zdroj (xxvii, 510 stran) :  |b ilustrace 
336 |a text  |b txt  |2 rdacontent 
337 |a počítač  |b c  |2 rdamedia 
338 |a online zdroj  |b cr  |2 rdacarrier 
500 |a Includes index. 
505 0 |a Understanding Cybersecurity Controls -- The Risk-Based Approach -- Small Business Implentation -- Medium-Sized Enterprises -- Large Corporations -- Introduction to MITRE ATTACK -- Mapping Threats to Controls using MITRE ATTACK -- Enhancing Defenses with MITRE DEFEND -- Cybersecurity Frameworks Overview -- NIST 800- -- Center for Internet Security 18 Controls -- Agile Implementation of Controls and Control Frameworks -- Adaptive Control Testing & Continuous Improvement -- Testing Controls in Small and Medium Enterprises -- Control Testing in Larger and Complex Enterprises -- Control Failures Identification, Management, and Reporting -- Control Testing for Regulated Companies -- Emerging Threats and Technologies -- Appendix A -- Glossary of Terms -- Appendix B -- Risk Register Example -- Appendix C -- Risk Taxonomy -- Appendix D -- SME Security Team Structure -- Appendix E -- Developing Process Maps -- Appendix F -- Establishing a Regulatory Change Management Program -- Appendix G -- Recommended Metrics for MITRE ATTACK Techniques. 
506 |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty 
520 |a "This book is an essential resource for anyone looking to protect their organization in the digital age; whether running a small business, managing a medium-sized company, or leading a large corporation, this book contains strategies that will fit all needs. Written in a highly accessible, jargon-free style, the highly experienced author shares his advice for effective cybersecurity controls which are crucial for protecting sensitive data, maintaining system integrity, and ensuring privacy. They help prevent data breaches, reduce financial risks, and build trust. Additionally, they are vital for meeting regulatory requirements in various industries. As technology advances, these controls will become increasingly important in securing our digital world. Each chapter provides clear explanations of foundational concepts before delving into more advanced topics, ensuring that readers understand the basics. Additionally, the book includes appendices and links to online resources for those who need to brush up on specific skills. By incorporating these supportive elements, the book ensures that all readers can fully grasp and apply the cybersecurity strategies discussed regardless of their starting point"-- Provided by publisher. 
588 |a Description based on online resource; title from digital title page (viewed on March 21, 2025). 
650 0 |a Computer security. 
650 0 |a Data protection. 
650 0 |a Business enterprises  |x Data processing  |x Security measures. 
655 7 |a elektronické knihy  |7 fd186907  |2 czenas 
655 9 |a electronic books  |2 eczenas 
710 2 |a John Wiley & Sons,  |e publisher. 
776 0 8 |i Print version:  |a Edwards, Jason  |t Cybersecurity control playbook  |d Hoboken, NJ : Wiley, 2025  |z 9781394331857  |w (DLC) 2025001243 
776 0 8 |i Print version :  |z 9781394331857 
856 4 0 |u https://proxy.k.utb.cz/login?url=https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888 
992 |c EBOOK-TN  |c WILEY 
993 |x NEPOSILAT  |y EIZ 
999 |c 115234  |d 115234