Features and Benefits

Features - Developing Cybersecurity Programs and Policies  

  • The in-depth, up-to-the-minute guide to information security policy for every practitioner and advanced student
  • In-depth coverage of information security policy from definition, psychology, standard frameworks, and creating a culture of compliance
  • Thorough coverage of Security Education, Training & Awareness (SETA)
  • Appendices include: Employee Affirmation Statement and Resources for Security Professionals
  • Recommended text for the capstone course in the Pearson® IT Cybersecurity Curriculum

Overview

Overview - Developing Cybersecurity Programs and Policies

A complete guide to establishing a cybersecurity program and governance in your organization. In this book, students will learn how to create cybersecurity policies, standards, procedures, guidelines, and plans — and the differences among them. This book covers the Confidentiality, Integrity & Availability (CIA) security model. Students will also learn how threat actors are launching attacks against their victims compromising confidentiality, integrity, and availability of systems and networks. This book covers the NIST Cybersecurity Framework and ISO/IEC 27000-series standards. Readers will learn how to align security with business strategy, as well as define, inventory, and classify information and systems.  

This book teaches students how to systematically identify, prioritize, and manage cybersecurity risks and reduce social engineering (human) risks with role-based Security Education, Awareness, and Training (SETA). They will also learn how to implement effective physical, environmental, communications, and operational security; and effectively manage access control. In this book students will learn how to respond to incidents and ensure continuity of operations and how to comply with laws and regulations, including GLBA, HIPAA/HITECH, FISMA, state data security and notification rules, and PCI DSS.