Скачать книгу

d="u1daedc56-8866-58c3-abce-7ef8f4557dff">

      

      Table of Contents

      1  Cover

      2  Title Page

      3  Copyright

      4  Dedication

      5  Foreword

      6  Preface WHY WRITE THIS BOOK? NOTES

      7  Acknowledgments

      8  About the Author

      9  Introduction ABOUT THIS BOOK HOW TO USE THIS BOOK

      10  PART ONE: Fundamentals CHAPTER ONE: Minimum Security Investment for Maximum Risk Reduction COMMUNICATING YOUR CYBERSECURITY EMAIL SECURITY SECURE YOUR CREDENTIALS SAAS CAN BE SECURE PATCHING ANTIVIRUS IS STILL NECESSARY BUT GOES BY A DIFFERENT NAME MOBILE DEVICES SUMMARY ACTION PLAN NOTES CHAPTER TWO: Cybersecurity Strategy and Roadmap Development WHAT TYPE OF BUSINESS IS THIS? WHAT TYPES OF CUSTOMERS WILL WE SELL TO? WHAT TYPES OF INFORMATION WILL THE BUSINESS CONSUME? WHAT TYPES OF INFORMATION WILL THE BUSINESS CREATE? WHERE GEOGRAPHICALLY WILL BUSINESS BE CONDUCTED? BUILDING THE ROADMAP CASE STUDY SUMMARY ACTION PLAN NOTE CHAPTER THREE: Secure Your Credentials PASSWORD MANAGERS PASSPHRASE MULTI-FACTOR AUTHENTICATION ENTITLEMENTS KEY MANAGEMENT CASE STUDY SUMMARY ACTION PLAN NOTES CHAPTER FOUR: Endpoint Protection VENDORS SELECTING AN EDR MANAGED DETECTION AND RESPONSE CASE STUDY SUMMARY ACTION PLAN NOTES CHAPTER FIVE: Your Office Network YOUR FIRST OFFICE SPACE CO-WORKING SPACES VIRTUAL PRIVATE NETWORK SUMMARY ACTION PLAN NOTES CHAPTER SIX: Your Product in the Cloud SECURE YOUR CLOUD PROVIDER ACCOUNTS PROTECT YOUR WORKLOADS SECURE YOUR CONTAINERS SUMMARY ACTION PLAN NOTES CHAPTER SEVEN: Information Technology ASSET MANAGEMENT IDENTITY AND ACCESS MANAGEMENT SUMMARY ACTION PLAN

      11  PART TWO: Growing the Team CHAPTER EIGHT: Hiring, Outsourcing, or Hybrid CATALYSTS TO HIRING GET THE FIRST HIRE RIGHT EXECUTIVE VERSUS INDIVIDUAL CONTRIBUTOR Скачать книгу