E-book details

The Cyber Security Handbook. Prepare, respond, and recover from cyber attacks using the IT Governance Cyber Resilience Framework

The Cyber Security Handbook. Prepare, respond, and recover from cyber attacks using the IT Governance Cyber Resilience Framework

IT Governance Publishing, Alan Calder

Ebook
This book offers a deep dive into cybersecurity, equipping professionals with tools and frameworks to protect organizations from diverse cyber threats. It covers critical areas such as information security, cyber resilience, and the regulatory and contractual requirements organizations must meet. The book delves into threat anatomy, analyzing technical, human, physical, and third-party vulnerabilities, and includes real-world case studies like the TalkTalk breach and WannaCry ransomware attack.

It also emphasizes third-party risk management to ensure robust security practices across all areas. The book introduces the IT Governance Cyber Resilience Framework (CRF), a structured method for managing critical systems, guiding readers through the processes of identification, detection, response, recovery, and continual improvement. Practical strategies in areas like asset management, network security, and staff training are included.

The final section offers actionable steps for implementing cybersecurity practices and introduces reference frameworks like NIST and ISO 27001 for compliance and ongoing improvement. With real-world examples and actionable frameworks, this guide is essential for professionals aiming to enhance their organization's cyber resilience.
  • 1. The Threat Landscape
  • 2. Information and Cyber Security
  • 3. Cyber Resilience
  • 4. Regulatory and Contractual Requirements
  • 5. Implementing Cyber Security
  • 6. The Anatomy of Threats
  • 7. Technical Threats
  • 8. Human Threats
  • 9. Physical Threats
  • 10. Third-Party Threats
  • 11. An Overview of the CRF Processes
  • 12. Manage and Protect
  • 13. Identify and Detect
  • 14. Respond and Recover
  • 15. Govern and Assure
  • 16. Maturity Levels
  • 17. Introducing the IT Governance Eight-Step Approach
  • 18. Step 1 – Start the Project
  • 19. Step 2 – Determine Requirements and Objectives
  • 20. Step 3 – Determine the Scope
  • 21. Step 4 – Define Current and Ideal Target States
  • 22. Step 5 – Establish a Continual Improvement Model
  • 23. Step 6 – Conduct a Risk Assessment
  • 24. Step 7 – Select and Implement Controls
  • 25. Step 8 – Measure and Review Performance
  • 26. Why You Should Consider Reference Frameworks
  • 27. Core
  • 28. Baseline
  • 29. Extended
  • 30. Embedded
  • 31. Conclusion
  • Title: The Cyber Security Handbook. Prepare, respond, and recover from cyber attacks using the IT Governance Cyber Resilience Framework
  • Author: IT Governance Publishing, Alan Calder
  • Original title: The Cyber Security Handbook. Prepare, respond, and recover from cyber attacks using the IT Governance Cyber Resilience Framework
  • ISBN: 9781806381326, 9781806381326
  • Date of issue: 2025-07-28
  • Format: Ebook
  • Item ID: e_4j82
  • Publisher: IT Governance Publishing