A CISO’s Guide to Bolstering Cybersecurity Posture
Sean Atkinson
The CISO blog launched on the CIS website in January 2018. Since then it has provided guidance on a number of cybersecurity topics with a special focus on the importance and implementation of the CIS ControlsTM, a collaboratively developed, prioritized set of actions to protect your organization and data from known cyber attack vectors.
This book is a compilation of some of the blog posts in one place for easy reference. It begins with an introduction to cybersecurity approaches and then moves into identifying and calculating risk. In today’s world, risk and data protection go hand- in-hand; that’s the third section of the book. Finally, we conclude with some cybersecurity implementation strategies.
The book is organized so that you can easily jump to the section that most interests you. Some of the original posts have been edited for content and length. If you find this book valuable, you may wish to read the original and future CISO blog posts at https://www.cisecurity.org/.
This book is a compilation of some of the blog posts in one place for easy reference. It begins with an introduction to cybersecurity approaches and then moves into identifying and calculating risk. In today’s world, risk and data protection go hand- in-hand; that’s the third section of the book. Finally, we conclude with some cybersecurity implementation strategies.
The book is organized so that you can easily jump to the section that most interests you. Some of the original posts have been edited for content and length. If you find this book valuable, you may wish to read the original and future CISO blog posts at https://www.cisecurity.org/.
Tahun:
2018
Penerbit:
Center for Internet Security
Bahasa:
english
Halaman:
31
Fail:
PDF, 1.37 MB
IPFS:
,
english, 2018