
- 200 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Security-First Compliance for Small Businesses
About this book
Organizations of all sizes struggle to secure their data in a constantly evolving digital landscape. Expanding digital footprints and the rapid expansion of cloud strategies arising from the COVID-19 pandemic increase an organization's attack surface. When combined with limited resources caused by the cybersecurity skills gap, securing small and mid-sized business IT infrastructures becomes more complicated. With limited staffing and budgetary restrictions, small businesses need to create cost-effective, security-driven programs that protect data while also meeting increasingly stringent compliance requirements.
This book bridges the gap between complex technical language and business objectives to create a security-first review of the security and compliance landscapes. Starting from the premise that "with security comes compliance," this book starts by defining "security-first" and then walking readers through the process of creating a holistic security and compliance program.
Looking at security and privacy through the lens of zero trust, this overview of regulations and industry standards provides both background about and implications drawn from modern security practices. Rather than focusing solely on individual cybersecurity frameworks, this book offers insights into best practices based on the commonalities between regulations and industry standards, highlighting some of the primary differences to show the nuances.
Woven throughout are practical examples of solutions that enable small and mid-sized businesses to create "cybersustainable" security-focused policies, processes, and controls that protect today's future for tomorrow's digital ecosystem.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Half Title
- Title Page
- Copyright Page
- Dedication
- Table of Contents
- Acknowledgments
- Introduction
- Chapter 1 Into the Mind of a Malicious Actor
- Chapter 2 Reviewing the Compliance Landscape
- Chapter 3 Compliance Risk
- Chapter 4 Looking at Risk through a Security Lens
- Chapter 5 How to Set Controls
- Chapter 6 Continuous Monitoring
- Chapter 7 Vendor Risk Management: Securing the Supply Chain
- Chapter 8 Calculating the Total Cost of Compliance
- Chapter 9 Information Security Audit: The What, How, and Why
- Chapter 10 Cyber Liability Insurance
- Chapter 11 Cybersustainability: Ethical Data Handling for Corporate Responsibility
- Chapter 12 Magic 8 Ball Says “Yes”
- Index