
- English
- PDF
- Available on iOS & Android
The Cybersecurity Guide to Governance, Risk, and Compliance
About this book
The Cybersecurity Guide to Governance, Risk, and Compliance
Understand and respond to a new generation of cybersecurity threats
Cybersecurity has never been a more significant concern of modern businesses, with security breaches and confidential data exposure as potentially existential risks. Managing these risks and maintaining compliance with agreed-upon cybersecurity policies is the focus of Cybersecurity Governance and Risk Management. This field is becoming ever more critical as a result. A wide variety of different roles and categories of business professionals have an urgent need for fluency in the language of cybersecurity risk management.
The Cybersecurity Guide to Governance, Risk, and Compliance meets this need with a comprehensive but accessible resource for professionals in every business area. Filled with cutting-edge analysis of the advanced technologies revolutionizing cybersecurity, increasing key risk factors at the same time, and offering practical strategies for implementing cybersecurity measures, it is a must-own for CISOs, boards of directors, tech professionals, business leaders, regulators, entrepreneurs, researchers, and more.
The Cybersecurity Guide to Governance, Risk, and Compliance also covers:
- Over 1300 actionable recommendations found after each section
- Detailed discussion of topics including AI, cloud, and quantum computing
- More than 70 ready-to-use KPIs and KRIs
"This guide's coverage of governance, leadership, legal frameworks, and regulatory nuances ensures organizations can establish resilient cybersecurity postures. Each chapter delivers actionable knowledge, making the guide thorough and practical."
— GARY McALUM, CISO
"This guide represents the wealth of knowledge and practical insights that Jason and Griffin possess. Designed for professionals across the board, from seasoned cybersecurity veterans to business leaders, auditors, and regulators, this guide integrates the latest technological insights with governance, risk, and compliance (GRC)".
— WIL BENNETT, CISO
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Title Page
- Copyright Page
- Dedication by Griffin Weaver
- Dedication by Jason Edwards
- Contents
- Purpose of the Book
- Target Audience
- Structure of the Book
- Foreword by Wil Bennett
- Foreword by Gary McAlum
- Chapter 1 Governance, Risk Management, and Compliance
- Chapter 2 The Landscape of Cybersecurity
- Chapter 3 Cybersecurity Leadership: Insights and Best Practices
- Chapter 4 Cybersecurity Program and Project Management
- Chapter 5 Cybersecurity for Business Executives
- Chapter 6 Cybersecurity and the Board of Directors
- Chapter 7 Risk Management
- Chapter 8 The NIST Risk Management Framework
- Chapter 9 Cybersecurity Metrics
- Chapter 10 Risk Assessments
- Chapter 11 NIST Cybersecurity Framework
- Chapter 12 Cybersecurity Frameworks
- Chapter 13 NIST SP 800-53: Security and Privacy Controls Framework
- Chapter 14 The FFIEC: An Introduction
- Chapter 15 U.S. Federal Cybersecurity Regulations
- Chapter 16 State-level Cybersecurity Regulations
- Chapter 17 International Cybersecurity Laws and Regulations
- Chapter 18 Privacy Laws and Their Intersection with Cybersecurity
- Chapter 19 Auditing Cybersecurity: Guides for Auditors and the Audited
- Chapter 20 The Challenging Role of the Regulator
- Chapter 21 Understanding US Regulatory Bodies
- Chapter 22 Managing Regulatory Visits and Requests for Information
- Chapter 23 Understanding Regulatory Penalties
- Chapter 24 Addressing and Remediating Regulatory Findings
- Chapter 25 Cybersecurity Architecture
- Chapter 26 Risk Mitigation
- Chapter 27 Cloud Security
- Chapter 28 Artificial Intelligence in Cybersecurity
- Chapter 29 Quantum Computing: A New Frontier
- Chapter 30 Incident Response and Recovery
- Chapter 31 Navigating the Cyber Insurance Maze
- Glossary
- Cybersecurity Resources
- Ready-to-Use KPI Examples
- Ready-to-Use KRI Examples
- The End
- Index
- EULA