Developing Cybersecurity Programs and Policies, 3rd edition

Published by Pearson IT Certification (July 14, 2021) © 2019

  • Omar Santos Best-selling Cisco Press author, expert trainer, and Principal Engineer at Cisco (PSIRT)

In this eTextbook — More ways to learn

  • More flexible. Start learning right away, on any device.
  • More supportive. Get AI explanations and practice questions (select titles).
  • More interactive. Bring learning to life with audio, videos, and diagrams.
  • More memorable. Make concepts stick with highlights, search, notes, and flashcards.
  • More understandable. Translate text into 100+ languages with one tap.

In this eTextbook — More ways to learn

  • More flexible. Start learning right away, on any device.
  • More supportive. Get AI explanations and practice questions (select titles).
  • More interactive. Bring learning to life with audio, videos, and diagrams.
  • More memorable. Make concepts stick with highlights, search, notes, and flashcards.
  • More understandable. Translate text into 100+ languages with one tap.

In this eTextbook — More ways to learn

  • More flexible. Start learning right away, on any device.
  • More supportive. Get AI explanations and practice questions (select titles).
  • More interactive. Bring learning to life with audio, videos, and diagrams.
  • More memorable. Make concepts stick with highlights, search, notes, and flashcards.
  • More understandable. Translate text into 100+ languages with one tap.

Table of contents

  • Chapter 1. Understanding Cybersecurity Policy and Governance
  • Chapter 2. Cybersecurity Policy Organization, Format and Styles
  • Chapter 3. Cybersecurity Framework
  • Chapter 4. Governance and Risk Management
  • Chapter 5. Asset Management and Data Loss Prevention
  • Chapter 6. Human Resources Security
  • Chapter 7. Physical and Environmental Security
  • Chapter 8. Communications and Operations Security
  • Chapter 9. Access Control Management
  • Chapter 10. Information Systems Acquisition, Development, and Maintenance
  • Chapter 11. Cybersecurity Incident Response
  • Chapter 12. Business Continuity Management
  • Chapter 13. Regulatory Compliance for Financial Institutions
  • Chapter 14. Regulatory Compliance for the Healthcare Sector
  • Chapter 15. PCI Compliance for Merchants
  • Appendix A. Information Security Program Resources
  • Appendix B. Sample Information Security Policy
  • Appendix C. Information Systems Acceptable Use Agreement and Policy

Author bios

This publication contains markup to enable structural navigation and compatibility with assistive technologies. Images in the publication MAY NOT be fully described, which is a barrier to those who rely on alternative text descriptions. The publication supports text reflow and contains no content hazards known to cause adverse physical reactions.

Need help?Get in touch