This website uses cookies. View our cookie policy
Close
Gulf
Select regional store:
Comprehensive Cybersecurity Toolkit Suite

Comprehensive Cybersecurity Risk Management Toolkit Suite

SKU: 4295
Format: Microsoft Office suite, PDF (Adobe Reader), vsRisk software
ISBN13: 9781849286619
Published: 01 Jan 0001

Fully up-to-date with ISO27001: 2013, this toolkit helps you to implement a robust cyber secure framework

Price: $2,678.00

Description

*Note: you are purchasing templates compatible with Office 2007, 2010, and 2013. If you require templates compatible with earlier or other (e.g. Mac) versions of Microsoft Office, please contact us.

Govern and manage Cybersecurity risk with this unique comprehensive toolkit suite.

There are a number of standalone, best practice approaches to managing cyber risk, none of which is on its own completely satisfactory. This toolkit helps you make an enormous leap forward by consolidating five separate approaches into a single, comprehensive, robust framework.

  • PAS 555:2013 is the new standard for cybersecurity risk governance and management; it was created to work with a range of other standards
  • ISO/IEC 27032 is the international guidance standard for managing cybersecurity risk
  • The Cloud Controls Matrix was developed by the Cloud Security Alliance for Cloud service providers
  • "Ten Steps to Cyber Security" is the methodology developed by the UK’s Business Department to help organizations of all sizes secure their cyber defenses
  • ISO/IEC 27001: 2013 is the internationally recognized standard against which an information security management system can achieve accredited certification








Use the Cybersecurity Governance & Risk Management Toolkit for a new, fresh implementation of a comprehensive management system that will also be capable of ISO27001 certification, or take advantage of this toolkit’s modular construction and control mapping matrix to add its additional controls to an existing ISO27001 management system.









This Cybersecurity Governance & Risk Management Toolkit recognizes that mobile device management is a critical component of effective cyber risk control and therefore includes the ITGP BYOD Policy Toolkit as a value-added extra.









Looking for a version compliant with ISO27001:2005? Get in touch with us today using the details and preferred method mentioned below.

   

Call us

To find out how this toolkit can help you, or if you have any questions







call our expert staff on 1 817 317 3454.







Or contact us by email or via the Live Chat feature at the side of your screen









More info…









Included in this comprehensive toolkit suite is:

 

PAS 555 2013: Cybersecurity Risk Governance and Management

PAS 555:2013 defines what effective cybersecurity looks like. The many other standards and sources of best practice on cybersecurity tend to focus on the delivery of effective cybersecurity (the how), whereas PAS 555 doesn't specify such practices or actions—it details what effective cybersecurity looks like (the what). The cybersecurity approach in PAS 555 allows organizations to choose how they achieve the specified outcomes, by using standards such as ISO/IEC 27001, ISO/IEC 27032 it makes compliance achievable in a familiar environment, especially for those who have implemented ISO 27001.

ISO 27032: Guidelines for Cybersecurity

ISO 27032 provides you with an overview of cybersecurity and shows how cybersecurity is related to other types of security, such as information security, network security, Internet security, etc.

The standard provides guidance for improving the state of cybersecurity, drawing out the unique aspects of that activity and its dependencies on other security domains.









BIS Ten Steps to Cybersecurity

HMG and CESG published "The 10 Steps to Cyber Security – Cyber Security Guidance for Business," in October 2012. Based on "defense in depth," the guidance provides recommendations in ten areas in which businesses were encouraged to focus, which are:

  1. Information Risk Management
  2. Secure Configuration
  3. Network Security
  4. Managing User Privileges
  5. User Education and Awareness
  6. Incident management
  7. Malware prevention
  8. Monitoring
  9. Removable Media Controls
  10. Home and Mobile Working








BYOD

BYOD (Bring Your Own Device) promises improved productivity, reduced capital expenditure and better work-life balance for employees. It also promises security and compliance problems for organizations that have inadequate BYOD policies.









To hear about new titles and exclusive offers from IT Governance Publishing, sign up and select "Books" from the New Products options.

 

For more information, read our FAQ here

 

Customer Reviews

(0# of Ratings:)
Loading...