Cybersecurity for the Enterprise
Shipping & Delivery
Our Delivery Time Frames Explained
2-4 Working Days: Available in-stock
10-20 Working Days: On Backorder
Will Deliver When Available: On Pre-Order or Reprinting
We ship your order once all items have arrived at our warehouse and are processed. Need those 2-4 day shipping items sooner? Just place a separate order for them!
Product details
- ISBN 9781119873341
- Publication Date: 26 Feb 2025
- Publisher: John Wiley & Sons Inc
- Publication City/Country: US
- Product Form: Hardback
Take an evidence-based approach to cybersecurity control design
A call to action for enterprises to demand a modern, data-driven approach to cybersecurity, Cybersecurity for the Enterprise: How to Design a Security Policy with Evidence-Based Methods delivers a how-to guide for the design and implementation of a modern security policy in an enterprise firm that’s based on empirical research instead of current industry consensus alone. It introduces techniques to critically review available research and evaluate the credibility of the findings as the basis for control selection.
The author explains how to structure a streamlined policy and differentiate between policy statements based on data and those based on industry habit. He explores the measurement of the efficacy of controls and provides practical demonstrations of how to justify evidence-based policies to internal and external stakeholders. The book also includes:
- Templates with policy language that maximize impact on the typical employee
- Reviews of current research that challenge the status quo and evolve industry best practices
- Highlights of areas in conventional security policy and industry standards that lack empirical support
- An efficient lens for how to prioritize what really matters in a security policy and how to ignore irrelevant “noise”
Ideal for information security executives, managers, and other leaders, Cybersecurity for the Enterprise is an essential blueprint for maximizing the impact of practical research and creating a security infrastructure based on real-world evidence.
