Cybersecurity Program Development for Business: The Essential Planning Guide

  • 4h 20m
  • Chris Moschovitis
  • John Wiley & Sons (US)
  • 2018

Get answers to all your cybersecurity questions

In 2016, we reached a tipping point—a moment where the global and local implications of cybersecurity became undeniable. Despite the seriousness of the topic, the term "cybersecurity" still exasperates many people. They feel terrorized and overwhelmed. The majority of business people have very little understanding of cybersecurity, how to manage it, and what's really at risk.

This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles and responsibilities, this book walks the reader through each step of developing and implementing a cybersecurity program. Read cover-to-cover, it’s a thorough overview, but it can also function as a useful reference book as individual questions and difficulties arise.

  • Unlike other cybersecurity books, the text is not bogged down with industry jargon
  • Speaks specifically to the executive who is not familiar with the development or implementation of cybersecurity programs
  • Shows you how to make pragmatic, rational, and informed decisions for your organization
  • Written by a top-flight technologist with decades of experience and a track record of success

If you’re a business manager or executive who needs to make sense of cybersecurity, this book demystifies it for you.

About the Author

Chris Moschovitis was born and raised in Athens, Greece and moved to the United States in 1979. Here, he studied Physics, Computer Science, and Mathematics, receiving his Bachelors of Science degree from The College at Brockport in 1983. His follow-up graduate studies at the University of Rochester, and New York University include advanced courses in technology, management, and education. Following his move to New York City in 1985, Chris was appointed Director of Academic Computing at Pratt Institute, and in 1987 he was recruited by the O’Connor Group for the position of Vice President of Information Technology.

In 1989 Chris started his own company — the Information Technology Management Group. (www.tmgr.com)— focusing on providing independent technology management expertise and outsourcing services. TMG further expanded its Internet offerings in 2004 by investing in emedia (www.emediaweb.com) – a prominent, award winning, and internationally acclaimed interactive software development firm, forming tmg-emedia (www.tmg-emedia.com). Today, tmg-emedia is one of the premier independent consulting firms in the country.

Chris is co-author of the critically acclaimed “History of the Internet: 1843 to the Present” as well as a contributor to the “Encyclopedia of Computers and Computer History” and the “Encyclopedia of New Media.”

He is both cybersecurity certified (CSX, CISM) and IT Governance (CGEIT), as well as an active member of ISACA, ISSA, IEEE, and AMA. Chris, in addition to his duties as Chairman & CEO, personally leads the tmg-emedia cybersecurity and governance teams and personally delivers cybersecurity awareness training and consulting to corporations world-wide. He remains an active speaker and writer, delivering workshops on a variety of topics, including Cybersecurity, Governance, Digital Transformation and Interactive Strategy, Business Transformation, and Information Technology Strategy and Execution.

Chris' latest book is "Cybersecurity Program Development for Business: The Essential Planning Guide." This essential work, with its many examples and case studies, breaks down every element of the development and management of a cybersecurity program for the business owner and executive. From understanding the need, to core risk management principles, to threats, tools, roles and responsibilities, this book walks the reader through each step of developing and implementing a cybersecurity program. Read cover-to-cover, it’s a thorough overview, but it can also function as a useful reference book as individual questions and difficulties arise.

You can follow Chris on Twitter (@CMoschovitis), LinkedIn, and Facebook.

In this Book

  • Foreword
  • Preface
  • Understanding Risk
  • Everything You Always Wanted to Know about Tech (But Were Afraid to Ask Your Kids)
  • A Cybersecurity Primer
  • Management, Governance, and Alignment
  • Your Cybersecurity Program—A High-Level Overview
  • Assets
  • Threats
  • Vulnerabilities
  • Environments
  • Controls
  • Incident-Response Planning
  • People
  • Living Cybersecure!
  • Bibliography
SHOW MORE
FREE ACCESS

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.7 of 15 users Rating 4.7 of 15 users (15)
Rating 4.5 of 86 users Rating 4.5 of 86 users (86)
Rating 4.6 of 242 users Rating 4.6 of 242 users (242)