Introduction |
|
xxi | |
Assessment Test |
|
xxxii | |
|
Chapter 1 Today's Information Security Manager |
|
|
1 | (30) |
|
Information Security Objectives |
|
|
2 | (1) |
|
Role of the Information Security Manager |
|
|
3 | (5) |
|
Chief Information Security Officer |
|
|
4 | (1) |
|
|
4 | (1) |
|
Organizing the Security Team |
|
|
5 | (2) |
|
Roles and Responsibilities |
|
|
7 | (1) |
|
Information Security Risks |
|
|
8 | (4) |
|
|
8 | (1) |
|
|
9 | (3) |
|
Building an Information Security Strategy |
|
|
12 | (8) |
|
|
12 | (1) |
|
|
13 | (1) |
|
|
13 | (3) |
|
|
16 | (1) |
|
Alignment with Business Strategy |
|
|
16 | (1) |
|
|
17 | (1) |
|
Internal and External Influences |
|
|
17 | (1) |
|
Cybersecurity Responsibilities |
|
|
18 | (1) |
|
|
19 | (1) |
|
|
19 | (1) |
|
Implementing Security Controls |
|
|
20 | (3) |
|
Security Control Categories |
|
|
21 | (1) |
|
|
21 | (2) |
|
|
23 | (2) |
|
|
25 | (1) |
|
|
25 | (2) |
|
|
27 | (4) |
|
Chapter 2 Information Security Governance and Compliance |
|
|
31 | (32) |
|
|
33 | (5) |
|
|
33 | (2) |
|
Governance, Risk, and Compliance Programs |
|
|
35 | (1) |
|
Information Security Governance |
|
|
35 | (1) |
|
Developing Business Cases |
|
|
36 | (1) |
|
Third-Party Relationships |
|
|
37 | (1) |
|
Understanding Policy Documents |
|
|
38 | (8) |
|
|
38 | (2) |
|
|
40 | (2) |
|
|
42 | (1) |
|
|
43 | (1) |
|
Exceptions and Compensating Controls |
|
|
44 | (1) |
|
|
45 | (1) |
|
Complying with Laws and Regulations |
|
|
46 | (1) |
|
Adopting Standard Frameworks |
|
|
47 | (9) |
|
|
47 | (2) |
|
NIST Cybersecurity Framework |
|
|
49 | (3) |
|
NIST Risk Management Framework |
|
|
52 | (1) |
|
|
53 | (1) |
|
Benchmarks and Secure Configuration Guides |
|
|
54 | (2) |
|
Security Control Verification and Quality Control |
|
|
56 | (1) |
|
|
57 | (1) |
|
|
57 | (2) |
|
|
59 | (4) |
|
Chapter 3 Information Risk Management |
|
|
63 | (28) |
|
|
65 | (7) |
|
|
66 | (1) |
|
|
67 | (1) |
|
|
68 | (4) |
|
Risk Treatment and Response |
|
|
72 | (3) |
|
|
73 | (1) |
|
|
74 | (1) |
|
|
74 | (1) |
|
|
75 | (1) |
|
|
75 | (3) |
|
Disaster Recovery Planning |
|
|
78 | (1) |
|
|
78 | (1) |
|
|
79 | (1) |
|
|
79 | (5) |
|
Sensitive Information Inventory |
|
|
80 | (1) |
|
Information Classification |
|
|
80 | (2) |
|
Data Roles and Responsibilities |
|
|
82 | (1) |
|
|
83 | (1) |
|
Privacy-Enhancing Technologies |
|
|
83 | (1) |
|
Privacy and Data Breach Notification |
|
|
84 | (1) |
|
|
84 | (1) |
|
|
85 | (1) |
|
|
86 | (5) |
|
Chapter 4 Cybersecurity Threats |
|
|
91 | (24) |
|
Exploring Cybersecurity Threats |
|
|
92 | (9) |
|
Classifying Cybersecurity Threats |
|
|
92 | (2) |
|
|
94 | (5) |
|
|
99 | (2) |
|
Threat Data and Intelligence |
|
|
101 | (8) |
|
|
101 | (3) |
|
Proprietary and Closed Source Intelligence |
|
|
104 | (1) |
|
Assessing Threat Intelligence |
|
|
105 | (2) |
|
Threat Indicator Management and Exchange |
|
|
107 | (1) |
|
Public and Private Information Sharing Centers |
|
|
108 | (1) |
|
Conducting Your Own Research |
|
|
108 | (1) |
|
|
109 | (1) |
|
|
109 | (2) |
|
|
111 | (4) |
|
Chapter 5 Information Security Program Development and Management |
|
|
115 | (30) |
|
Information Security Programs |
|
|
117 | (6) |
|
Establishing a New Program |
|
|
117 | (4) |
|
Maintaining an Existing Program |
|
|
121 | (2) |
|
Security Awareness and Training |
|
|
123 | (2) |
|
|
123 | (1) |
|
|
124 | (1) |
|
Ongoing Awareness Efforts |
|
|
124 | (1) |
|
Managing the Information Security Team |
|
|
125 | (2) |
|
|
126 | (1) |
|
Developing the Security Team |
|
|
126 | (1) |
|
Managing the Security Budget |
|
|
127 | (3) |
|
|
127 | (1) |
|
|
127 | (1) |
|
|
128 | (1) |
|
|
129 | (1) |
|
Integrating Security with Other Business Functions |
|
|
130 | (9) |
|
|
130 | (3) |
|
|
133 | (1) |
|
|
133 | (2) |
|
|
135 | (3) |
|
|
138 | (1) |
|
|
139 | (1) |
|
|
139 | (2) |
|
|
141 | (4) |
|
Chapter 6 Security Assessment and Testing |
|
|
145 | (36) |
|
|
146 | (15) |
|
|
146 | (2) |
|
Determining Scan Frequency |
|
|
148 | (1) |
|
Configuring Vulnerability Scans |
|
|
149 | (5) |
|
|
154 | (1) |
|
Vulnerability Scanning Tools |
|
|
155 | (4) |
|
Reviewing and Interpreting Scan Reports |
|
|
159 | (1) |
|
|
160 | (1) |
|
|
161 | (6) |
|
|
162 | (1) |
|
|
163 | (1) |
|
|
164 | (1) |
|
|
164 | (1) |
|
|
165 | (1) |
|
|
166 | (1) |
|
|
167 | (7) |
|
Adopting the Hacker Mindset |
|
|
168 | (1) |
|
Reasons for Penetration Testing |
|
|
169 | (1) |
|
Benefits of Penetration Testing |
|
|
169 | (1) |
|
|
170 | (1) |
|
|
171 | (2) |
|
|
173 | (1) |
|
|
173 | (1) |
|
|
174 | (1) |
|
|
174 | (1) |
|
|
175 | (1) |
|
|
176 | (1) |
|
|
177 | (4) |
|
Chapter 7 Cybersecurity Technology |
|
|
181 | (68) |
|
|
182 | (4) |
|
|
183 | (1) |
|
Endpoint Detection and Response |
|
|
183 | (1) |
|
|
184 | (1) |
|
Change and Configuration Management |
|
|
185 | (1) |
|
|
185 | (1) |
|
|
185 | (1) |
|
|
186 | (9) |
|
|
186 | (2) |
|
|
188 | (3) |
|
|
191 | (4) |
|
|
195 | (17) |
|
|
196 | (2) |
|
|
198 | (1) |
|
|
198 | (4) |
|
|
202 | (2) |
|
Shared Responsibility Model |
|
|
204 | (3) |
|
Cloud Standards and Guidelines |
|
|
207 | (1) |
|
|
208 | (2) |
|
|
210 | (2) |
|
|
212 | (11) |
|
|
212 | (2) |
|
|
214 | (1) |
|
|
215 | (2) |
|
|
217 | (1) |
|
|
218 | (1) |
|
|
219 | (1) |
|
Certificate Generation and Destruction |
|
|
220 | (3) |
|
|
223 | (11) |
|
Software Development Life Cycle |
|
|
223 | (1) |
|
Software Development Phases |
|
|
224 | (2) |
|
Software Development Models |
|
|
226 | (3) |
|
|
229 | (1) |
|
|
230 | (2) |
|
Software Security Testing |
|
|
232 | (2) |
|
Identity and Access Management |
|
|
234 | (6) |
|
Identification, Authentication, and Authorization |
|
|
234 | (1) |
|
Authentication Techniques |
|
|
235 | (2) |
|
|
237 | (1) |
|
Single-Sign On and Federation |
|
|
238 | (1) |
|
Provisioning and Deprovisioning |
|
|
238 | (1) |
|
|
239 | (1) |
|
|
240 | (1) |
|
|
241 | (3) |
|
|
244 | (5) |
|
Chapter 8 Incident Response |
|
|
249 | (48) |
|
|
251 | (1) |
|
Phases of Incident Response |
|
|
252 | (17) |
|
|
253 | (1) |
|
|
254 | (1) |
|
Containment, Eradication, and Recovery |
|
|
255 | (12) |
|
|
267 | (2) |
|
Building the Incident Response Plan |
|
|
269 | (3) |
|
|
269 | (1) |
|
|
270 | (1) |
|
Documenting the Incident Response Plan |
|
|
270 | (2) |
|
Creating an Incident Response Team |
|
|
272 | (1) |
|
Incident Response Providers |
|
|
273 | (1) |
|
|
273 | (1) |
|
Coordination and Information Sharing |
|
|
273 | (1) |
|
|
274 | (1) |
|
|
274 | (1) |
|
|
274 | (5) |
|
|
275 | (1) |
|
|
276 | (3) |
|
Conducting Investigations |
|
|
279 | (9) |
|
|
279 | (3) |
|
|
282 | (6) |
|
Plan Training, Testing, and Evaluation |
|
|
288 | (1) |
|
|
289 | (1) |
|
|
290 | (2) |
|
|
292 | (5) |
|
Chapter 9 Business Continuity and Disaster Recovery |
|
|
297 | (60) |
|
Planning for Business Continuity |
|
|
298 | (1) |
|
Project Scope and Planning |
|
|
299 | (5) |
|
|
300 | (1) |
|
|
301 | (1) |
|
|
302 | (1) |
|
Legal and Regulatory Requirements |
|
|
303 | (1) |
|
|
304 | (6) |
|
|
305 | (1) |
|
|
306 | (2) |
|
|
308 | (1) |
|
|
309 | (1) |
|
|
310 | (1) |
|
|
310 | (3) |
|
|
311 | (1) |
|
|
311 | (2) |
|
Plan Approval and Implementation |
|
|
313 | (5) |
|
|
313 | (1) |
|
|
314 | (1) |
|
|
314 | (1) |
|
|
314 | (4) |
|
|
318 | (9) |
|
|
319 | (5) |
|
|
324 | (3) |
|
System Resilience, High Availability, and Fault Tolerance |
|
|
327 | (4) |
|
|
328 | (1) |
|
|
329 | (2) |
|
|
331 | (1) |
|
|
331 | (9) |
|
Business Unit and Functional Priorities |
|
|
332 | (1) |
|
|
333 | (1) |
|
|
334 | (1) |
|
|
334 | (1) |
|
Alternate Processing Sites |
|
|
334 | (4) |
|
|
338 | (2) |
|
Recovery Plan Development |
|
|
340 | (5) |
|
|
341 | (1) |
|
Personnel and Communications |
|
|
341 | (1) |
|
|
342 | (1) |
|
Backups and Offsite Storage |
|
|
342 | (3) |
|
|
345 | (1) |
|
|
345 | (1) |
|
Training, Awareness, and Documentation |
|
|
345 | (1) |
|
|
346 | (3) |
|
|
346 | (1) |
|
|
346 | (1) |
|
|
347 | (1) |
|
|
347 | (1) |
|
|
347 | (1) |
|
|
347 | (1) |
|
|
348 | (1) |
|
|
349 | (1) |
|
|
349 | (2) |
|
|
351 | (6) |
|
Appendix Answers to the Review Questions |
|
|
357 | (20) |
|
Chapter 1 Today's Information Security Manager |
|
|
358 | (2) |
|
Chapter 2 Information Security Governance and Compliance |
|
|
360 | (2) |
|
Chapter 3 Information Risk Management |
|
|
362 | (1) |
|
Chapter 4 Cybersecurity Threats |
|
|
363 | (2) |
|
Chapter 5 Information Security Program Development and Management |
|
|
365 | (3) |
|
Chapter 6 Security Assessment and Testing |
|
|
368 | (2) |
|
Chapter 7 Cybersecurity Technology |
|
|
370 | (2) |
|
Chapter 8 Incident Response |
|
|
372 | (2) |
|
Chapter 9 Business Continuity and Disaster Recovery |
|
|
374 | (3) |
Index |
|
377 | |