Schweitzer Fachinformationen
Wenn es um professionelles Wissen geht, ist Schweitzer Fachinformationen wegweisend. Kunden aus Recht und Beratung sowie Unternehmen, öffentliche Verwaltungen und Bibliotheken erhalten komplette Lösungen zum Beschaffen, Verwalten und Nutzen von digitalen und gedruckten Medien.
Understand and respond to a new generation of cybersecurity threats
Cybersecurity has never been a more significant concern of modern businesses, with security breaches and confidential data exposure as potentially existential risks. Managing these risks and maintaining compliance with agreed-upon cybersecurity policies is the focus of Cybersecurity Governance and Risk Management. This field is becoming ever more critical as a result. A wide variety of different roles and categories of business professionals have an urgent need for fluency in the language of cybersecurity risk management.
The Cybersecurity Guide to Governance, Risk, and Compliance meets this need with a comprehensive but accessible resource for professionals in every business area. Filled with cutting-edge analysis of the advanced technologies revolutionizing cybersecurity, increasing key risk factors at the same time, and offering practical strategies for implementing cybersecurity measures, it is a must-own for CISOs, boards of directors, tech professionals, business leaders, regulators, entrepreneurs, researchers, and more.
The Cybersecurity Guide to Governance, Risk, and Compliance also covers:
"This guide's coverage of governance, leadership, legal frameworks, and regulatory nuances ensures organizations can establish resilient cybersecurity postures. Each chapter delivers actionable knowledge, making the guide thorough and practical." -GARY McALUM, CISO
"This guide represents the wealth of knowledge and practical insights that Jason and Griffin possess. Designed for professionals across the board, from seasoned cybersecurity veterans to business leaders, auditors, and regulators, this guide integrates the latest technological insights with governance, risk, and compliance (GRC)". -WIL BENNETT, CISO
Dr. Jason Edwards, DM, CISSP, CRISC, is an esteemed cybersecurity expert and accomplished industry leader with over 25 years in cybersecurity, risk, and compliance, backed by a specialized doctorate in Cybersecurity Regulatory Risk and Compliance. A prolific educator and influencer, Dr. Edwards contributes as an Adjunct Cyber Professor at multiple universities and is recognized as a leading cybersecurity voice on LinkedIn. His portfolio includes many publications, including the notable Cyber Spear educational newsletter. In addition to his remarkable professional achievements, Dr. Edwards proudly served as a distinguished combat veteran and premier military cyber officer.
Griffin Weaver, JD, serves as the Managing Legal Director at a renowned technology company and is also a respected Adjunct Professor specializing in Cybersecurity Law. With a rich background encompassing various technical and managerial roles in IT, Griffin seamlessly transitioned into a flourishing legal career after earning his law degree from the University of Utah. As an acknowledged thought leader, Griffin has enhanced the domain with his scholarly contributions through numerous articles. He is a sought-after speaker renowned for his insightful presentations at cybersecurity conferences.
Purpose of the Book xvii
Target Audience xix
Structure of the Book xxi
Foreword by Wil Bennett xxiii
Foreword by Gary McAlum xxv
Chapter 1 Governance, Risk Management, and Compliance 1
Chapter 2 The Landscape of Cybersecurity 19
Chapter 3 Cybersecurity Leadership: Insights and Best Practices 33
Chapter 4 Cybersecurity Program and Project Management 53
Chapter 5 Cybersecurity for Business Executives 69
Chapter 6 Cybersecurity and the Board of Directors 87
Chapter 7 Risk Management 109
Chapter 8 The NIST Risk Management Framework 131
Chapter 9 Cybersecurity Metrics 151
Chapter 10 Risk Assessments 171
Chapter 11 NIST Cybersecurity Framework 191
Chapter 12 Cybersecurity Frameworks 209
Chapter 13 NIST SP 800-53: Security and Privacy Controls Framework 231
Chapter 14 The FFIEC: An Introduction 245
Chapter 15 U.S. Federal Cybersecurity Regulations 267
Chapter 16 State-level Cybersecurity Regulations 287
Chapter 17 International Cybersecurity Laws and Regulations 299
Chapter 18 Privacy Laws and Their Intersection with Cybersecurity 315
Chapter 19 Auditing Cybersecurity: Guides for Auditors and the Audited 333
Chapter 20 The Challenging Role of the Regulator 355
Chapter 21 Understanding US Regulatory Bodies 377
Chapter 22 Managing Regulatory Visits and Requests for Information 395
Chapter 23 Understanding Regulatory Penalties 409
Chapter 24 Addressing and Remediating Regulatory Findings 429
Chapter 25 Cybersecurity Architecture 445
Chapter 26 Risk Mitigation 463
Chapter 27 Cloud Security 481
Chapter 28 Artificial Intelligence in Cybersecurity 497
Chapter 29 Quantum Computing: A New Frontier 511
Chapter 30 Incident Response and Recovery 521
Chapter 31 Navigating the Cyber Insurance Maze 541
Glossary 549
Cybersecurity Resources 555
Ready to Use KPI Examples 567
Ready to Use KRI Examples 599
The End 631
Index 633
"Cybersecurity governance empowers us with wisdom, risk management equips us with foresight, and compliance holds us accountable to our commitment to protecting our digital assets. Together, they form an unbreakable shield against cyber adversaries."
Integrating governance, risk, and compliance (GRC) into an organization's operations offers considerable advantages, including improved decision-making, increased operational efficiency, strengthened reputation, and cost reductions. It is essential to align GRC with business goals to leverage its potential and ensure optimal efficiency. Both theoretical principles and practical insights show the inherent business value and distinctive benefits offered by GRC when it is smoothly embedded within an organization's strategic framework.
GRC is a crucial concept that guides organizations toward efficient operation. It offers an integrated, holistic approach to corporate governance, risk management, and regulatory compliance. Understanding the concept of GRC and its components, their interrelations, and their importance across industries forms the basis of this section.
Governance is managing a company to ensure it meets its statutory and legal obligations, while risk management involves identifying, assessing, and controlling threats to an organization's capital and earnings. Compliance refers to an organization's conformance with regulatory requirements and industry standards.
It is crucial to comprehend the significance of GRC across industries. Whether healthcare, finance, or information technology (IT), every industry faces unique risks, governance issues, and regulatory requirements. Understanding GRC allows organizations in these diverse sectors to address these issues effectively.
Emphasizing security, the banking industry is compelled to confront a diverse range of threats. The Graham-Leach-Bliley Act (GLBA) and the Dodd-Frank Act in the United States require the implementation of robust compliance mechanisms to strengthen institutional security against regulatory violations. Concurrently, banks need to handle risks tied to lending and market volatility, necessitating a reliable risk management system designed to enhance financial security. Furthermore, the industry must have strong cybersecurity measures to face the ever-present danger of cyber threats.
On the other hand, the healthcare sector faces strict patient data protection regulations like the Health Insurance Portability and Accountability Act (HIPAA) in the United States, requiring compliance systems. They also face risks related to patient safety and cybersecurity, calling for risk management, and require good governance to ensure quality healthcare delivery.
In the digital age, where cyber threats are rising, the IT industry faces unique GRC challenges. For instance, they must comply with data protection regulations like the General Data Protection Regulation (GDPR) in the EU, manage risks related to cybersecurity, and maintain good governance for efficient and ethical operation.
Understanding GRC and its components provides a road map to navigate industries' complex operational landscape. It offers a framework to efficiently address the challenges related to GRC, allowing organizations to maintain their competitive edge.
Recommendations:
The business case for GRC extends beyond simply meeting regulatory requirements. Implementing GRC in a business context can offer many benefits, promote alignment with business objectives, and significantly enhance operational efficiency. The case for GRC becomes compelling when considering these aspects.
At the heart of GRC lies the integration of GRC activities traditionally managed in isolation. This integration offers numerous benefits. It allows for more informed decision-making, efficient resource use, and improved organizational performance. When a business has a holistic view of its risks, it is better equipped to identify and mitigate potential threats before they become costly. Through a GRC approach, the organization's leadership gains visibility into the possible areas of noncompliance, thereby allowing for proactive remediation and the opportunity to avoid regulatory penalties.
The alignment of GRC activities with business objectives is a strategic imperative that fosters business growth and resilience. By embedding GRC into strategic planning, an organization can ensure its initiatives align with its risk appetite and adhere to relevant regulations. This alignment leads to achieving objectives and enhances shareholder confidence in the organization.
Operational efficiency is another critical benefit derived from GRC implementation. Organizations can achieve significant cost savings by eliminating the overlap of activities and streamlining processes across GRC. Furthermore, GRC promotes a culture of transparency and accountability, which leads to better governance and operational excellence.
Despite the myriad benefits of GRC, implementing it is not without its challenges. Organizations often struggle with defining roles and responsibilities, managing change, and sustaining commitment toward GRC. The following sections will delve into these aspects further, offering practical insights into how to overcome these challenges.
Regarding the interlinked concepts of GRC, governance encompasses the structured set of practices and protocols by which an organization is directed, managed, and controlled. It sets the fundamental tone for the entire organization, establishing clear roles, defining responsibilities, and setting the course for accountability. An organization rooted in strong governance principles lays a solid, unshakeable foundation for GRC. This is because it outlines the strategic direction of the business and forms the mechanisms for reaching these goals, all while meeting the required ethical standards and legal prerequisites.
Good governance, a nonnegotiable part of any successful organization, is constructed from several vital elements. These include a comprehensible and well-defined organizational structure, decision-making processes that are effective and well established, transparent leadership that is accountable to stakeholders, strong and clear communication mechanisms, and routine performance evaluations to keep track of progress and areas of improvement. When these elements are put into place with careful consideration and are allowed to function efficiently, governance becomes the driving force that propels an organization toward achieving its strategic goals. Concurrently, it ensures that all conduct...
Dateiformat: ePUBKopierschutz: Adobe-DRM (Digital Rights Management)
Systemvoraussetzungen:
Das Dateiformat ePUB ist sehr gut für Romane und Sachbücher geeignet – also für „fließenden” Text ohne komplexes Layout. Bei E-Readern oder Smartphones passt sich der Zeilen- und Seitenumbruch automatisch den kleinen Displays an. Mit Adobe-DRM wird hier ein „harter” Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.Bitte beachten Sie: Wir empfehlen Ihnen unbedingt nach Installation der Lese-Software diese mit Ihrer persönlichen Adobe-ID zu autorisieren!
Weitere Informationen finden Sie in unserer E-Book Hilfe.