Almost ready!
In order to save audiobooks to your Wish List you must be signed in to your account.
Log in Create accountShop small, give big!
With credit bundles, you choose the number of credits and your recipient picks their audiobooks—all in support of local bookstores.
Start giftingLimited-time offer
Get two free audiobooks!
Nowโs a great time to shop indie. When you start a new one credit per month membership supporting local bookstores with promo code SWITCH, weโll give you two bonus audiobook credits at sign-up.
Sign up todayCyber Resilience
This audiobook uses AI narration.
Weโre taking steps to make sure AI narration is transparent.
Learn moreWe live in a world where technology and vast quantities of data play a considerable role in everyday life, both personal and professional.
For the foreseeable future (and perhaps beyond), the growth and prominence of data in business shows no signs of slowing down, even if the technology in question will likely change in ways perhaps unimaginable today. Naturally, all this innovation brings huge opportunities and benefits to organisations and people alike. However, these come at more than just a financial cost.
In the world as we know it, you can be attacked both physically and virtually. For today's organisations, which rely so heavily on technology โ particularly the Internet โ to do business, the latter attack is the far more threatening of the two. The cyber threat landscape is complex and constantly changing. For every vulnerability fixed, another pops up, ripe for exploitation. Worse, when a vulnerability is identified, a tool that can exploit it is often developed and used within hours โ faster than the time it normally takes for the vendor to release a patch, and certainly quicker than the time many organisations take to install that patch.
This book has been divided into two parts:
- Part 1:ย Security principles.
- Part 2:ย Reference controls.Part 1 is designed to give you a concise but solid grounding in the principles of good security, covering key terms, risk management, different aspects of security, defence in depth, implementation tips, and more. This part is best read from beginning to end.
Part 2 is intended as a useful reference, discussing a wide range of good-practice controls (in alphabetical order) you may want to consider implementing. Each control is discussed at a high level, focusing on the broader principles, concepts and points to consider, rather than specific solutions. Each control has also been written as a stand-alone chapter, so you can just read the controls that interest you, in an order that suits you.
Alan Calder is a leading author on IT governance and information security issues. He is the CEO of GRC International Group plc, the AIM-listed company that owns IT Governance Ltd. Alan is an acknowledged international cyber security guru. He has been involved in the development of a wide range of information security management training courses that have been accredited by the International Board for IT Governance Qualifications (IBITGQ). He is a frequent media commentator on information security and IT governance issues, and has contributed articles and expert comment to a wide range of trade, national and online news outlets.