Description

Book Synopsis
Harden your business against internal and external cybersecurity threats with a single accessible resource. In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical roadmap to cyber resilience in any organization. Offering you the lessons she learned while working for major tech companies like Sophos, AT&T, BlackBerry Cylance, Tripwire, and Venafi, Crawley condenses the essence of business cybersecurity into eight steps. Written to be accessible to non-technical businesspeople as well as security professionals, and with insights from other security industry leaders, this important book will walk you through how to: Foster a strong security culture that extends from the custodial team to the C-suiteBuild an effective security team, regardless of the size or nature of your businessComply with regulatory requirements, including general data privacy rules and industry-specific legislationTest your cybersecurity, including third-party penetration testing and internal red team specialists Perfect for CISOs, security leaders, non-technical businesspeople, and managers at any level, 8 Steps to Better Security is also a must-have resource for companies of all sizes, and in all industries.

Table of Contents

Foreword xi

Introduction xiii

Chapter 1: Step 1: Foster a Strong Security Culture 1

Kevin Mitnick, Human Hacker Extraordinaire 3

The Importance of a Strong Security Culture 5

Hackers Are the Bad Guys, Right? 6

What is Security Culture? 7

How to Foster a Strong Security Culture 9

Security Leaders on Security Culture 12

What Makes a Good CISO? 13

The Biggest Mistakes Businesses Make When It Comes to Cybersecurity 14

The Psychological Phases of a Cybersecurity Professional 15

Chapter 2: Step 2: Build a Security Team 19

Why Step 2 is Controversial 20

How to Hire the Right Security Team. . .the Right Way 28

Security Team Tips from Security Leaders 29

The “Culture Fit”—Yuck! 30

Cybersecurity Budgets 34

Design Your Perfect Security Team 35

Chapter 3: Step 3: Regulatory Compliance 39

What Are Data Breaches, and Why Are They Bad? 40

The Scary Truth Found in Data Breach Research 45

An Introduction to Common Data Privacy Regulations 49

The General Data Protection Regulation 49

The California Consumer Privacy Act 50

The Health Insurance Portability and Accountability Act 52

The Gramm-Leach-Bliley Act 52

Payment Card Industry Data Security Standard 53

Governance, Risk Management, and Compliance 53

More About Risk Management 54

Threat Modeling 55

Chapter 4: Step 4: Frequent Security Testing 57

What is Security Testing? 58

Security Testing Types 58

Security Audits 58

Vulnerability Assessments Versus Penetration Testing 59

Red Team Testing 61

Bug Bounty Programs 61

What’s Security Maturity? 63

The Basics of Security Audits and Vulnerability Assessments 64

Log Early, Log Often 66

Prepare for Vulnerability Assessments and Security Audits 67

A Concise Guide to Penetration Testing 69

Penetration Testing Based on Network Knowledge 70

Penetration Testing Based on Network Aspects 73

Security Leaders on Security Maturity 76

Security Testing is Crucial 78

Chapter 5: Step 5: Security Framework Application 79

What is Incident Response? 80

Preparation 80

Identification or Analysis 82

Containment, Mitigation, or Eradication 83

Recovery 84

Post-incident 86

Your Computer Security Incident Response Team 86

Cybersecurity Frameworks 89

NIST Cybersecurity Framework 89

Identify 90

Protect 92

Detect 95

Respond 97

Recover 99

ISO 27000 Cybersecurity Frameworks 101

CIS Controls 102

COBIT Cybersecurity Framework 105

Security Frameworks and Cloud Security 106

Chapter 6: Step 6: Control Your Data Assets 109

The CIA Triad 110

Access Control 112

Patch Management 113

Physical Security and Your Data 115

Malware 116

Cryptography Basics 119

Bring Your Own Device and Working from Home 123

Data Loss Prevention 124

Managed Service Providers 126

The Dark Web and Your Data 128

Security Leaders on Cyber Defense 130

Control Your Data 132

Chapter 7: Step 7: Understand the Human Factor 133

Social Engineering 134

Phishing 139

What Can NFTs and ABA Teach Us About Social Engineering? 141

How to Prevent Social Engineering Attacks on Your Business 146

UI and UX Design 147

Internal Threats 148

Hacktivism 152

Chapter 8: Step 8: Build Redundancy and Resilience 155

Understanding Data and Networks 156

Building Capacity and Scalability with the Power of the Cloud 158

Back It Up, Back It Up, Back It Up 161

RAID 162

What Ransomware Taught Business About Backups 164

Business Continuity 167

Disaster Recovery 168

Chapter 9: Afterword 173

Step 1 173

The Most Notorious Cyberattacker Was Actually a Con Man 174

A Strong Security Culture Requires All Hands on Deck 174

Hackers Are the Good Guys, Actually 174

What Is Security Culture? 175

What Makes a Good CISO? 175

The Psychological Phases of a Cybersecurity Professional 176

Recommended Readings 177

Step 2 178

Tackling the Cybersecurity Skills Gap Myth 178

Take “Culture Fit” Out of Your Vocabulary 179

Your Cybersecurity Budget 180

Recommended Readings 180

Step 3 181

Data Breaches 181

Data Privacy Regulations 182

Risk Management 183

Recommended Readings 183

Step 4 184

Security Audits 184

Vulnerability Assessments 185

Penetration Testing 185

Bug Bounty Programs 185

Recommended Reading 186

Step 5 187

Incident Response 187

Cybersecurity Frameworks 187

Recommended Reading 188

Step 6 188

The CIA Triad 188

Access Control 189

Patch Management 189

Physical Security 189

Malware 189

Cryptography 190

BYOD and Working from Home 190

Data Loss Prevention 191

Managed Service Providers 191

Recommended Reading 191

Step 7 192

Social Engineering 192

UI and UX Design 193

Internal Threats 193

Recommended Readings 194

Step 8 194

Cloud Networks 195

Data Backups 195

Business Continuity and Disaster Recovery 196

Recommended Readings 196

Keeping Your Business Cyber Secure 197

Index 199

8 Steps to Better Security

Product form

£19.54

Includes FREE delivery

RRP £22.99 – you save £3.45 (15%)

Order before 4pm tomorrow for delivery by Sat 10 Jan 2026.

A Paperback / softback by Kim Crawley

2 in stock


    View other formats and editions of 8 Steps to Better Security by Kim Crawley

    Publisher: John Wiley & Sons Inc
    Publication Date: 18/11/2021
    ISBN13: 9781119811237, 978-1119811237
    ISBN10: 1119811236
    Also in:
    Data encryption

    Description

    Book Synopsis
    Harden your business against internal and external cybersecurity threats with a single accessible resource. In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical roadmap to cyber resilience in any organization. Offering you the lessons she learned while working for major tech companies like Sophos, AT&T, BlackBerry Cylance, Tripwire, and Venafi, Crawley condenses the essence of business cybersecurity into eight steps. Written to be accessible to non-technical businesspeople as well as security professionals, and with insights from other security industry leaders, this important book will walk you through how to: Foster a strong security culture that extends from the custodial team to the C-suiteBuild an effective security team, regardless of the size or nature of your businessComply with regulatory requirements, including general data privacy rules and industry-specific legislationTest your cybersecurity, including third-party penetration testing and internal red team specialists Perfect for CISOs, security leaders, non-technical businesspeople, and managers at any level, 8 Steps to Better Security is also a must-have resource for companies of all sizes, and in all industries.

    Table of Contents

    Foreword xi

    Introduction xiii

    Chapter 1: Step 1: Foster a Strong Security Culture 1

    Kevin Mitnick, Human Hacker Extraordinaire 3

    The Importance of a Strong Security Culture 5

    Hackers Are the Bad Guys, Right? 6

    What is Security Culture? 7

    How to Foster a Strong Security Culture 9

    Security Leaders on Security Culture 12

    What Makes a Good CISO? 13

    The Biggest Mistakes Businesses Make When It Comes to Cybersecurity 14

    The Psychological Phases of a Cybersecurity Professional 15

    Chapter 2: Step 2: Build a Security Team 19

    Why Step 2 is Controversial 20

    How to Hire the Right Security Team. . .the Right Way 28

    Security Team Tips from Security Leaders 29

    The “Culture Fit”—Yuck! 30

    Cybersecurity Budgets 34

    Design Your Perfect Security Team 35

    Chapter 3: Step 3: Regulatory Compliance 39

    What Are Data Breaches, and Why Are They Bad? 40

    The Scary Truth Found in Data Breach Research 45

    An Introduction to Common Data Privacy Regulations 49

    The General Data Protection Regulation 49

    The California Consumer Privacy Act 50

    The Health Insurance Portability and Accountability Act 52

    The Gramm-Leach-Bliley Act 52

    Payment Card Industry Data Security Standard 53

    Governance, Risk Management, and Compliance 53

    More About Risk Management 54

    Threat Modeling 55

    Chapter 4: Step 4: Frequent Security Testing 57

    What is Security Testing? 58

    Security Testing Types 58

    Security Audits 58

    Vulnerability Assessments Versus Penetration Testing 59

    Red Team Testing 61

    Bug Bounty Programs 61

    What’s Security Maturity? 63

    The Basics of Security Audits and Vulnerability Assessments 64

    Log Early, Log Often 66

    Prepare for Vulnerability Assessments and Security Audits 67

    A Concise Guide to Penetration Testing 69

    Penetration Testing Based on Network Knowledge 70

    Penetration Testing Based on Network Aspects 73

    Security Leaders on Security Maturity 76

    Security Testing is Crucial 78

    Chapter 5: Step 5: Security Framework Application 79

    What is Incident Response? 80

    Preparation 80

    Identification or Analysis 82

    Containment, Mitigation, or Eradication 83

    Recovery 84

    Post-incident 86

    Your Computer Security Incident Response Team 86

    Cybersecurity Frameworks 89

    NIST Cybersecurity Framework 89

    Identify 90

    Protect 92

    Detect 95

    Respond 97

    Recover 99

    ISO 27000 Cybersecurity Frameworks 101

    CIS Controls 102

    COBIT Cybersecurity Framework 105

    Security Frameworks and Cloud Security 106

    Chapter 6: Step 6: Control Your Data Assets 109

    The CIA Triad 110

    Access Control 112

    Patch Management 113

    Physical Security and Your Data 115

    Malware 116

    Cryptography Basics 119

    Bring Your Own Device and Working from Home 123

    Data Loss Prevention 124

    Managed Service Providers 126

    The Dark Web and Your Data 128

    Security Leaders on Cyber Defense 130

    Control Your Data 132

    Chapter 7: Step 7: Understand the Human Factor 133

    Social Engineering 134

    Phishing 139

    What Can NFTs and ABA Teach Us About Social Engineering? 141

    How to Prevent Social Engineering Attacks on Your Business 146

    UI and UX Design 147

    Internal Threats 148

    Hacktivism 152

    Chapter 8: Step 8: Build Redundancy and Resilience 155

    Understanding Data and Networks 156

    Building Capacity and Scalability with the Power of the Cloud 158

    Back It Up, Back It Up, Back It Up 161

    RAID 162

    What Ransomware Taught Business About Backups 164

    Business Continuity 167

    Disaster Recovery 168

    Chapter 9: Afterword 173

    Step 1 173

    The Most Notorious Cyberattacker Was Actually a Con Man 174

    A Strong Security Culture Requires All Hands on Deck 174

    Hackers Are the Good Guys, Actually 174

    What Is Security Culture? 175

    What Makes a Good CISO? 175

    The Psychological Phases of a Cybersecurity Professional 176

    Recommended Readings 177

    Step 2 178

    Tackling the Cybersecurity Skills Gap Myth 178

    Take “Culture Fit” Out of Your Vocabulary 179

    Your Cybersecurity Budget 180

    Recommended Readings 180

    Step 3 181

    Data Breaches 181

    Data Privacy Regulations 182

    Risk Management 183

    Recommended Readings 183

    Step 4 184

    Security Audits 184

    Vulnerability Assessments 185

    Penetration Testing 185

    Bug Bounty Programs 185

    Recommended Reading 186

    Step 5 187

    Incident Response 187

    Cybersecurity Frameworks 187

    Recommended Reading 188

    Step 6 188

    The CIA Triad 188

    Access Control 189

    Patch Management 189

    Physical Security 189

    Malware 189

    Cryptography 190

    BYOD and Working from Home 190

    Data Loss Prevention 191

    Managed Service Providers 191

    Recommended Reading 191

    Step 7 192

    Social Engineering 192

    UI and UX Design 193

    Internal Threats 193

    Recommended Readings 194

    Step 8 194

    Cloud Networks 195

    Data Backups 195

    Business Continuity and Disaster Recovery 196

    Recommended Readings 196

    Keeping Your Business Cyber Secure 197

    Index 199

    Recently viewed products

    © 2026 Book Curl

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account