Lavoisier S.A.S.
14 rue de Provigny
94236 Cachan cedex
FRANCE

Heures d'ouverture 08h30-12h30/13h30-17h30
Tél.: +33 (0)1 47 40 67 00
Fax: +33 (0)1 47 40 67 02


Url canonique : www.lavoisier.fr/livre/informatique/cyber-strategy/descriptif_4271983
Url courte ou permalien : www.lavoisier.fr/livre/notice.asp?ouvrage=4271983

Cyber Strategy Risk-Driven Security and Resiliency

Langue : Anglais

Auteurs :

Couverture de l’ouvrage Cyber Strategy

Cyber Strategy: Risk-Driven Security and Resiliency provides a process and roadmap for any company to develop its unified Cybersecurity and Cyber Resiliency strategies. It demonstrates a methodology for companies to combine their disassociated efforts into one corporate plan with buy-in from senior management that will efficiently utilize resources, target high risk threats, and evaluate risk assessment methodologies and the efficacy of resultant risk mitigations. The book discusses all the steps required from conception of the plan from preplanning (mission/vision, principles, strategic objectives, new initiatives derivation), project management directives, cyber threat and vulnerability analysis, cyber risk and controls assessment to reporting and measurement techniques for plan success and overall strategic plan performance. In addition, a methodology is presented to aid in new initiative selection for the following year by identifying all relevant inputs.

Tools utilized include:

  • Key Risk Indicators (KRI) and Key Performance Indicators (KPI)
  • National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF) Target State Maturity interval mapping per initiative
  • Comparisons of current and target state business goals and critical success factors
  • A quantitative NIST-based risk assessment of initiative technology components
  • Responsible, Accountable, Consulted, Informed (RACI) diagrams for Cyber Steering Committee tasks and Governance Boards? approval processes
  • Swimlanes, timelines, data flow diagrams (inputs, resources, outputs), progress report templates, and Gantt charts for project management

The last chapter provides downloadable checklists, tables, data flow diagrams, figures, and assessment tools to help develop your company?s cybersecurity and cyber resiliency strategic plan.

Author Biographies. 1 Why Cybersecurity and Cyber Resiliency Strategies Are Mandatory for Organizations Today. 2 The 6 STEPs in Developing and Maintaining a Cybersecurity and Cyber Resiliency Strategy. 3 Strategy Project Management. 4 Cyber Threats, Vulnerabilities, and Intelligence Analysis. 5 Cyber Risks and Controls. 6 Current and Target State Assessments. 7 Measuring Strategic Plan Performance and End of Year (EoY) Tasks. 8 Checklists and Templates to Help Create an Enterprise-Wide Cybersecurity and Cyber Resiliency Strategy

Academic and Professional Practice & Development

Carol A. Siegel is a Cybersecurity strategy and IT Risk Management professional with over 30+ years’ experience. Carol earned her BS in Systems Analysis Engineering from Boston University in 1971, and her MBA in Computer Applications from New York University in 1984. She has CISSP, CISA and CISM certifications from ISC2 and ISACA respectively. Carol has co-authored one of the first books on Internet security, a book for Microsoft on Windows NT Security as well as numerous articles for Auerbach Publications on information security and risk management. Carol has worked for many Fortune 50 financial services companies in the Banking, Insurance, Big Four, and Pharma sectors and has held several Chief Information Security Officer (CISO) positions. Most recently, Carol worked for the Federal Reserve Bank of New York.

Mark Sweeney is a Cybersecurity and Cyber Resiliency professional with over 5 years of experience in strategizing and implementing risk-based cybersecurity and cyber resiliency programs. Mark earned his BS in Security & Risk Analysis – Information & Cyber Security from Penn State University in 2014. Mark has worked in Big Four consulting companies and the Financial Services Industry as a Cybersecurity and Cyber Resiliency expert and is currently a cyber underwriter.