{"product_id":"building-effective-cybersecurity-programs","title":"Building Effective Cybersecurity Programs: A Security Manager’s Handbook","description":"\u003cp\u003eYou know by now that your company could not survive without the Internet. Not in today’s market. You are either part of the digital economy or reliant upon it. With critical information assets at risk, your company requires a state-of-the-art cybersecurity program. But how do you achieve the best possible program? Tari Schreider, in \u003cem\u003eBuilding Effective Cybersecurity Programs: A Security Manager’s Handbook,\u003c\/em\u003e lays out the step-by-step roadmap to follow as you build or enhance your cybersecurity program.\u003c\/p\u003e\r\n\u003cp\u003eOver 30+ years, Tari Schreider has designed and implemented cybersecurity programs throughout the world, helping hundreds of companies like yours. Building on that experience, he has created a clear roadmap that will allow the process to go more smoothly for you. \u003cem\u003eBuilding Effective Cybersecurity Programs: A Security Manager’s Handbook\u003c\/em\u003e is organized around the six main steps on the roadmap that will put your cybersecurity program in place:\u003c\/p\u003e\r\n\u003col\u003e\r\n\u003cli\u003eDesign a Cybersecurity Program\u003c\/li\u003e\r\n\u003cli\u003eEstablish a Foundation of Governance\u003c\/li\u003e\r\n\u003cli\u003eBuild a Threat, Vulnerability Detection, and Intelligence Capability\u003c\/li\u003e\r\n\u003cli\u003eBuild a Cyber Risk Management Capability\u003c\/li\u003e\r\n\u003cli\u003eImplement a Defense-in-Depth Strategy\u003c\/li\u003e\r\n\u003cli\u003eApply Service Management to Cybersecurity Programs\u003c\/li\u003e\r\n\u003c\/ol\u003e\r\n\u003cp\u003eBecause Schreider has researched and analyzed over 150 cybersecurity architectures, frameworks, and models, he has saved you hundreds of hours of research. He sets you up for success by talking to you directly as a friend and colleague, using practical examples. His book helps you to:\u003c\/p\u003e\r\n\u003cul\u003e\r\n\u003cli\u003eIdentify the proper cybersecurity program roles and responsibilities.\u003c\/li\u003e\r\n\u003cli\u003eClassify assets and identify vulnerabilities.\u003c\/li\u003e\r\n\u003cli\u003eDefine an effective cybersecurity governance foundation.\u003c\/li\u003e\r\n\u003cli\u003eEvaluate the top governance frameworks and models.\u003c\/li\u003e\r\n\u003cli\u003eAutomate your governance program to make it more effective.\u003c\/li\u003e\r\n\u003cli\u003eIntegrate security into your application development process.\u003c\/li\u003e\r\n\u003cli\u003eApply defense-in-depth as a multi-dimensional strategy.\u003c\/li\u003e\r\n\u003cli\u003eImplement a service management approach to implementing countermeasures.\u003c\/li\u003e\r\n\u003c\/ul\u003e\r\n\u003cp\u003eWith this handbook, you can move forward confidently, trusting that Schreider is recommending the best components of a cybersecurity program for you. In addition, the book provides hundreds of citations and references allow you to dig deeper as you explore specific topics relevant to your organization or your studies.\u003c\/p\u003e\r\n","brand":"None","offers":[{"title":"Kobo eBook","offer_id":46427522924754,"sku":"7a52cec2-3cb8-3c42-9a51-a68fa18e45a1","price":43.99,"currency_code":"CAD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0655\/8980\/5233\/files\/image_c8fe1af2-31ed-4237-94c0-c372dfaf49fb.jpg?v=1762445839","url":"https:\/\/www.indigo.ca\/products\/building-effective-cybersecurity-programs","provider":"Indigo","version":"1.0","type":"link"}