with an
Acco share
you get a discount on Acco-titles, office supplies and selected titles.
Content
ALL THE KNOWLEDGE YOU NEED TO BUILD CYBERSECURITY PROGRAMS AND POLICIES THAT WORKClearly presents best practices, governance frameworks, and key standardsIncludes focused coverage of healthcare, finance, and PCI DSS complianceAn essential and invaluable guide for leaders, managers, and technical professionalsToday, cyberattacks can place entire organizations at risk. Cybersecurity can no longer be delegated to specialists: Success requires everyone to work together, from leaders on down. Developing Cybersecurity Programs and Policies in an AI-Driven World offers start-to-finish guidance for establishing effective cybersecurity in any organization. Drawing on more than two decades of real-world experience, Omar Santos presents realistic best practices for defining policy and governance, ensuring compliance, and collaborating to harden the entire organization.Santos begins by outlining the process of formulating actionable cybersecurity policies and creating a governance framework to support these policies. He then delves into various aspects of risk management, including strategies for asset management and data loss prevention, illustrating how to integrate various organizational functions-from HR to physical security-to enhance overall protection. This book covers many case studies and best practices for safeguarding communications, operations, and access; alongside strategies for the responsible acquisition, development, and maintenance of technology. It also discusses effective responses to security incidents. Santos provides a detailed examination of compliance requirements in different sectors and the NIST Cybersecurity Framework.LEARN HOW TOEstablish cybersecurity policies and governance that serve your organization's needsIntegrate cybersecurity program components into a coherent framework for actionAssess, prioritize, and manage security risk throughout the organizationManage assets and prevent data lossWork with HR to address human factors in cybersecurityHarden your facilities and physical environmentDesign effective policies for securing communications, operations, and accessStrengthen security throughout AI-driven deploymentsPlan for quick, effective incident response and ensure business continuityComply with rigorous regulations in finance and healthcareLearn about the NIST AI Risk Framework and how to protect AI implementationsExplore and apply the guidance provided by the NIST Cybersecurity Framework
Your email address has been noted. We will inform you when this item is available again.
Book condition
An important factor of a second-hand book is the condition of the book. The buyer may not be surprised. Always mention damages or defects. We use a system with 3 stars:
The book is acceptable: you have used it to study and made notes and markings – but everything is still readable. The cover and pages are in good condition.
The book still looks good: there are a few notes in it and you marked it. There are hardly any signs of use on the cover and pages
The book is (almost) new: you have not written or marked in it. There are no signs of use on the cover and pages
You need a code for this download
Your code is incorrect.
Log in
Not registered yet?
Create an account to buy or link an Acco share and buy your books and supplies at reduced rates.