* Section - ONE: Breaking the compliance myths - cybersecurity controls mean survival, not compliance; ** Chapter - 01: Understanding controls without drowning in jargon; ** Chapter - 02: Building an action-oriented cybersecurity strategy; ** Chapter - 03: Preparing for successful internal and external audits; * Section - TWO: Designing cybersecurity risk assessments - understanding principles of risk management; ** Chapter - 04: Translating business impact analysis into real decisions; ** Chapter - 05: Conducting risk assessment to prioritize actions plans; ** Chapter - 06: Managing third-party risk and vulnerabilities; * Section - THREE: Strengthening administrative controls - building a cyber aware culture; ** Chapter - 07: Writing effective policies and procedures to guide the organization; ** Chapter - 08: Conducting training to raise awareness one lesson at a time; ** Chapter - 09: Monitoring third-party relationships to protect both sides; * Section - FOUR: Locking down physical controls - offices, data centers and beyond; ** Chapter - 10: Securing spaces for internal vs external facilities; ** Chapter - 11: Safeguarding and monitoring physical assess; ** Chapter - 12: Protecting systems from environmental and power threats; * Section - FIVE: Powering up your technical controls - guarding the digital world; ** Chapter - 13: Managing internal vs external network threats; ** Chapter - 14: Controlling who gets your data with access management; ** Chapter - 15: Embedding security in change management and software development life cycle; * Section - SIX: Proving what works: Testing controls effectiveness; ** Chapter - 16: Building a smart control testing strategy; ** Chapter - 17: Partnering effectively with third-party auditors; ** Chapter - 18: Measuring and managing overall cyber governance; * Section - SEVEN: Building the cyber alliance - one team, one mission; ** Chapter - 19: Aligning business and security objectives; ** Chapter - 20: Defining internal audit's role in cyber defense; ** Chapter - 21: Bridging execution and testing with the CISO and CAE; ** Chapter - 22: Communicating cybersecurity risk to the board; ** Chapter - 23: Sustaining cybersecurity success for the long term.
Cybersecurity Controls : Design, Implement and Audit to Protect Your Organization