Acknowledgments |
|
xix | |
Introduction |
|
xxi | |
|
Part I Information Security Governance |
|
|
|
Chapter 1 Enterprise Governance |
|
|
3 | (34) |
|
Introduction to Information Security Governance |
|
|
4 | (2) |
|
Reason for Security Governance |
|
|
6 | (1) |
|
Security Governance Activities and Results |
|
|
7 | (1) |
|
|
8 | (1) |
|
|
9 | (1) |
|
|
10 | (1) |
|
|
10 | (1) |
|
Legal, Regulatory, and Contractual Requirements |
|
|
11 | (1) |
|
Organizational Structure, Roles, and Responsibilities |
|
|
12 | (1) |
|
|
13 | (3) |
|
|
16 | (2) |
|
|
18 | (1) |
|
Security Steering Committee |
|
|
19 | (1) |
|
Business Process and Business Asset Owners |
|
|
20 | (1) |
|
Custodial Responsibilities |
|
|
21 | (1) |
|
Chief Information Security Officer |
|
|
21 | (2) |
|
|
23 | (1) |
|
|
23 | (1) |
|
|
23 | (1) |
|
|
24 | (1) |
|
|
24 | (1) |
|
|
25 | (1) |
|
|
25 | (1) |
|
Governance, Risk, and Compliance |
|
|
26 | (1) |
|
|
27 | (1) |
|
|
27 | (1) |
|
|
28 | (1) |
|
|
28 | (1) |
|
|
28 | (1) |
|
|
28 | (1) |
|
|
29 | (1) |
|
Monitoring Responsibilities |
|
|
29 | (1) |
|
|
30 | (1) |
|
|
31 | (1) |
|
|
32 | (2) |
|
|
34 | (3) |
|
Chapter 2 Information Security Strategy |
|
|
37 | (64) |
|
Information Security Strategy Development |
|
|
38 | (1) |
|
|
38 | (1) |
|
|
39 | (1) |
|
|
40 | (15) |
|
|
55 | (13) |
|
|
68 | (4) |
|
Information Governance Frameworks and Standards |
|
|
72 | (1) |
|
Business Model for Information Security |
|
|
73 | (8) |
|
|
81 | (2) |
|
The Open Group Architecture Framework |
|
|
83 | (1) |
|
|
83 | (2) |
|
NIST Cybersecurity Framework |
|
|
85 | (2) |
|
NIST Risk Management Framework |
|
|
87 | (1) |
|
|
88 | (1) |
|
|
89 | (1) |
|
Developing a Business Case |
|
|
89 | (2) |
|
|
91 | (2) |
|
|
93 | (1) |
|
|
94 | (3) |
|
|
97 | (4) |
|
Part II Information Security Risk Management |
|
|
|
Chapter 3 Information Security Risk Assessment |
|
|
101 | (64) |
|
Emerging Risk and Threat Landscape |
|
|
102 | (1) |
|
The Importance of Risk Management |
|
|
102 | (1) |
|
Outcomes of Risk Management |
|
|
103 | (1) |
|
|
103 | (1) |
|
Risk Management Technologies |
|
|
104 | (1) |
|
Implementing a Risk Management Program |
|
|
105 | (10) |
|
The Risk Management Life Cycle |
|
|
115 | (12) |
|
Vulnerability and Control Deficiency Analysis |
|
|
127 | (2) |
|
Risk Assessment and Analysis |
|
|
129 | (1) |
|
|
129 | (7) |
|
|
136 | (1) |
|
Risk Likelihood and Impact |
|
|
137 | (2) |
|
Risk Analysis Techniques and Considerations |
|
|
139 | (6) |
|
Risk Management and Business Continuity Planning |
|
|
145 | (1) |
|
|
146 | (4) |
|
Integration of Risk Management into Other Processes |
|
|
150 | (7) |
|
|
157 | (2) |
|
|
159 | (1) |
|
|
160 | (2) |
|
|
162 | (3) |
|
Chapter 4 Information Security Risk Response |
|
|
165 | (26) |
|
Risk Treatment / Risk Response Options |
|
|
166 | (1) |
|
|
167 | (1) |
|
|
168 | (1) |
|
|
169 | (1) |
|
|
170 | (1) |
|
Evaluating Risk Response Options |
|
|
171 | (1) |
|
|
172 | (1) |
|
|
173 | (1) |
|
|
173 | (1) |
|
Risk Appetite, Capacity, and Tolerance |
|
|
174 | (1) |
|
Legal and Regulatory Considerations |
|
|
175 | (2) |
|
|
177 | (1) |
|
Risk and Control Ownership |
|
|
178 | (1) |
|
|
178 | (1) |
|
|
179 | (1) |
|
Risk Monitoring and Reporting |
|
|
180 | (1) |
|
|
180 | (1) |
|
|
181 | (1) |
|
|
182 | (1) |
|
|
182 | (1) |
|
|
183 | (1) |
|
|
184 | (2) |
|
|
186 | (5) |
|
Part III Information Security Risk Management |
|
|
|
Chapter 5 Information Security Program Development |
|
|
191 | (50) |
|
Information Security Program Resources |
|
|
192 | (1) |
|
|
192 | (1) |
|
|
193 | (1) |
|
|
194 | (1) |
|
|
195 | (1) |
|
Information Security Processes |
|
|
195 | (1) |
|
Information Security Technologies |
|
|
196 | (3) |
|
Information Asset Identification and Classification |
|
|
199 | (1) |
|
Asset Identification and Valuation |
|
|
199 | (3) |
|
|
202 | (7) |
|
|
209 | (1) |
|
Industry Standards and Frameworks for Information Security |
|
|
210 | (1) |
|
|
210 | (8) |
|
Information Security Management Frameworks |
|
|
218 | (1) |
|
Information Security Architecture |
|
|
218 | (2) |
|
Information Security Policies, Procedures, and Guidelines |
|
|
220 | (1) |
|
|
220 | (3) |
|
|
223 | (1) |
|
|
223 | (1) |
|
|
223 | (1) |
|
|
224 | (1) |
|
Information Security Program Metrics |
|
|
225 | (2) |
|
|
227 | (4) |
|
|
231 | (1) |
|
The Security Balanced Scorecard |
|
|
232 | (1) |
|
|
233 | (3) |
|
|
236 | (1) |
|
|
237 | (2) |
|
|
239 | (2) |
|
Chapter 6 Information Security Program Management |
|
|
241 | (164) |
|
Information Security Control Design and Selection |
|
|
242 | (1) |
|
|
242 | (3) |
|
|
245 | (1) |
|
General Computing Controls |
|
|
246 | (1) |
|
Controls: Build Versus Buy |
|
|
247 | (1) |
|
|
248 | (24) |
|
Information Security Control Implementation and Integrations |
|
|
272 | (1) |
|
|
272 | (3) |
|
|
275 | (1) |
|
Security and Control Operations |
|
|
275 | (46) |
|
Information Security Control Testing and Evaluation |
|
|
321 | (1) |
|
|
322 | (1) |
|
Control Reviews and Audits |
|
|
322 | (17) |
|
Information Security Awareness and Training |
|
|
339 | (1) |
|
Security Awareness Training Objectives |
|
|
339 | (1) |
|
Creating or Selecting Content for Security Awareness Training |
|
|
340 | (1) |
|
Security Awareness Training Audiences |
|
|
340 | (3) |
|
Awareness Training Communications |
|
|
343 | (1) |
|
Management of External Services |
|
|
344 | (1) |
|
|
345 | (1) |
|
|
345 | (3) |
|
Identifying Third Parties |
|
|
348 | (2) |
|
|
350 | (1) |
|
|
351 | (3) |
|
Risk Tiering and Vendor Classification |
|
|
354 | (2) |
|
|
356 | (4) |
|
Proactive Issue Remediation |
|
|
360 | (2) |
|
Responsive Issue Remediation |
|
|
362 | (1) |
|
|
362 | (1) |
|
Information Security Program Communications and Reporting |
|
|
363 | (1) |
|
|
363 | (1) |
|
|
363 | (1) |
|
|
364 | (6) |
|
|
370 | (3) |
|
|
373 | (2) |
|
Security Awareness Training |
|
|
375 | (1) |
|
|
376 | (1) |
|
|
376 | (6) |
|
Project and Program Management |
|
|
382 | (1) |
|
|
382 | (1) |
|
|
383 | (1) |
|
|
384 | (1) |
|
|
384 | (1) |
|
|
385 | (1) |
|
|
386 | (2) |
|
|
388 | (1) |
|
|
389 | (2) |
|
|
391 | (1) |
|
|
391 | (1) |
|
|
392 | (1) |
|
Service Continuity Management |
|
|
393 | (1) |
|
|
393 | (1) |
|
|
394 | (1) |
|
|
394 | (1) |
|
|
394 | (2) |
|
|
396 | (1) |
|
|
397 | (3) |
|
|
400 | (5) |
|
Part IV Incident Management |
|
|
|
Chapter 7 Incident Management Readiness |
|
|
405 | (94) |
|
|
406 | (2) |
|
Security Incident Response Overview |
|
|
408 | (3) |
|
Incident Response Plan Development |
|
|
411 | (6) |
|
|
417 | (1) |
|
Inventory of Key Processes and Systems |
|
|
417 | (2) |
|
|
419 | (1) |
|
|
420 | (2) |
|
Determine Maximum Tolerable Downtime |
|
|
422 | (1) |
|
Determine Maximum Tolerable Outage |
|
|
422 | (1) |
|
Establish Key Recovery Targets |
|
|
423 | (3) |
|
Business Continuity Plan (BCP) |
|
|
426 | (1) |
|
Business Continuity Planning |
|
|
427 | (28) |
|
Disaster Recovery Plan (DRP) |
|
|
455 | (1) |
|
Disaster Response Teams' Roles and Responsibilities |
|
|
456 | (1) |
|
|
457 | (16) |
|
Incident Classification/Categorization |
|
|
473 | (2) |
|
Incident Management Training, Testing, and Evaluation |
|
|
475 | (1) |
|
Security Incident Response Training |
|
|
475 | (1) |
|
Business Continuity and Disaster Response Training |
|
|
476 | (1) |
|
Testing Security Incident Response Plans |
|
|
477 | (1) |
|
Testing Business Continuity and Disaster Recovery Plans |
|
|
478 | (6) |
|
Evaluating Business Continuity Planning |
|
|
484 | (4) |
|
Evaluating Disaster Recovery Planning |
|
|
488 | (4) |
|
Evaluating Security Incident Response |
|
|
492 | (1) |
|
|
493 | (1) |
|
|
494 | (1) |
|
|
494 | (3) |
|
|
497 | (2) |
|
Chapter 8 Incident Management Operations |
|
|
499 | (32) |
|
Incident Management Tools and Techniques |
|
|
502 | (1) |
|
Incident Response Roles and Responsibilities |
|
|
502 | (1) |
|
Incident Response Tools and Techniques |
|
|
503 | (4) |
|
Incident Investigation and Evaluation |
|
|
507 | (1) |
|
|
507 | (2) |
|
|
509 | (1) |
|
|
509 | (4) |
|
Incident Containment Methods |
|
|
513 | (2) |
|
Incident Response Communications |
|
|
515 | (1) |
|
Crisis Management and Communications |
|
|
515 | (1) |
|
Communications in the Incident Response Plan |
|
|
516 | (1) |
|
Incident Response Metrics and Reporting |
|
|
517 | (2) |
|
Incident Eradication, and Recovery |
|
|
519 | (1) |
|
|
520 | (1) |
|
|
520 | (1) |
|
|
521 | (1) |
|
Post-incident Review Practices |
|
|
522 | (1) |
|
|
522 | (1) |
|
|
522 | (1) |
|
|
523 | (1) |
|
|
524 | (1) |
|
|
524 | (3) |
|
|
527 | (4) |
|
Part V Appendix and Glossary |
|
|
|
Appendix About the Online Content |
|
|
531 | (1) |
|
|
531 | (1) |
|
Your Total Seminars Training Hub Account |
|
|
531 | (1) |
|
|
531 | (1) |
|
Single User License Terms and Conditions |
|
|
531 | (2) |
|
|
533 | (1) |
|
|
533 | (2) |
Glossary |
|
535 | (42) |
Index |
|
577 | |