-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

A CISO Guide to Cyber Resilience
By :

A CISO Guide to Cyber Resilience
By:
Overview of this book
This book, written by the CEO of TrustedCISO with 30+ years of experience, guides CISOs in fortifying organizational defenses and safeguarding sensitive data. Analyze a ransomware attack on a fictional company, BigCo, and learn fundamental security policies and controls. With its help, you’ll gain actionable skills and insights suitable for various expertise levels, from basic to intermediate. You’ll also explore advanced concepts such as zero-trust, managed detection and response, security baselines, data and asset classification, and the integration of AI and cybersecurity. By the end, you'll be equipped to build, manage, and improve a resilient cybersecurity program, ensuring your organization remains protected against evolving threats.
Table of Contents (20 chapters)
Preface
In Progress
| 0 / 9 sections completed |
0%
Part 1: Attack on BigCo
In Progress
| 0 / 1 sections completed |
0%
Chapter 1: The Attack on BigCo
In Progress
| 0 / 4 sections completed |
0%
Part 2: Security Resilience: Getting the Basics Down
In Progress
| 0 / 1 sections completed |
0%
Chapter 2: Identity and Access Management
In Progress
| 0 / 6 sections completed |
0%
Chapter 3: Security Policies
In Progress
| 0 / 5 sections completed |
0%
Chapter 4: Security and Risk Management
In Progress
| 0 / 7 sections completed |
0%
Chapter 5: Securing Your Endpoints
In Progress
| 0 / 11 sections completed |
0%
Chapter 6: Data Safeguarding
In Progress
| 0 / 8 sections completed |
0%
Chapter 7: Security Awareness Culture
In Progress
| 0 / 4 sections completed |
0%
Chapter 8: Vulnerability Management
In Progress
| 0 / 5 sections completed |
0%
Chapter 9: Asset Inventory
In Progress
| 0 / 6 sections completed |
0%
Chapter 10: Data Protection
In Progress
| 0 / 5 sections completed |
0%
Part 3: Security Resilience: Taking Your Security Program to the Next Level
In Progress
| 0 / 1 sections completed |
0%
Chapter 11: Taking Your Endpoint Security to the Next Level
In Progress
| 0 / 7 sections completed |
0%
Chapter 12: Secure Configuration Baseline
In Progress
| 0 / 5 sections completed |
0%
Chapter 13: Classify Your Data and Assets
In Progress
| 0 / 7 sections completed |
0%
Chapter 14: Cyber Resilience in the Age of Artificial Intelligence (AI)
In Progress
| 0 / 8 sections completed |
0%
Index
In Progress
| 0 / 2 sections completed |
0%
Other Books You May Enjoy
In Progress
| 0 / 4 sections completed |
0%
Customer Reviews