000 -LEADER |
fixed length control field |
05722cam a2200505 i 4500 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20250905114259.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION |
fixed length control field |
m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr cnu---unuuu |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
250905t20242024njum o u001 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781394250202 |
Qualifying information |
electronic book |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
1394250207 |
Qualifying information |
electronic book |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781394250219 |
Qualifying information |
electronic book |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
1394250215 |
Qualifying information |
electronic book |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781394250226 |
Qualifying information |
electronic book |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
1394250223 |
Qualifying information |
electronic book |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
Cancelled/invalid ISBN |
9781394250196 |
Qualifying information |
hardcover |
024 7# - OTHER STANDARD IDENTIFIER |
Standard number or code |
10.1002/9781394250226 |
Source of number or code |
doi |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)1423504419 |
Canceled/invalid control number |
(OCoLC)1425791689 |
037 ## - SOURCE OF ACQUISITION |
Stock number |
9781394250196 |
Source of stock number/acquisition |
O'Reilly Media |
037 ## - SOURCE OF ACQUISITION |
Stock number |
10494574 |
Source of stock number/acquisition |
IEEE |
042 ## - AUTHENTICATION CODE |
Authentication code |
pcc |
050 04 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
HD30.38 |
Item number |
.E34 2024 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
23/eng/20240223 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Preferred name for the person |
Edwards, Jason |
Titles and other words associated with a name |
(Cybersecurity expert), |
Authority record control number |
https://id.loc.gov/authorities/names/n2024010546 |
Relator term |
author. |
245 14 - TITLE STATEMENT |
Title |
The cybersecurity guide to governance, risk, and compliance / |
Statement of responsibility, etc |
Dr. Jason Edwards, Griffin Weaver. |
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Hoboken, NJ : |
Name of publisher, distributor, etc |
John Wiley & Sons, Inc., |
Date of publication, distribution, etc |
2024. |
264 #4 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Date of publication, distribution, etc |
©2024. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
1 online resource (xxviii, 638 pages) |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent. |
337 ## - MEDIA TYPE |
Media type term |
computer |
Media type code |
c |
Source |
rdamedia. |
338 ## - CARRIER TYPE |
Carrier type term |
online resource |
Carrier type code |
cr |
Source |
rdacarrier. |
340 ## - PHYSICAL MEDIUM |
Source |
rdacc |
Authority record control number or standard number |
http://rdaregistry.info/termList/RDAColourContent/1003. |
500 ## - GENERAL NOTE |
General note |
Includes index. |
505 0# - CONTENTS |
Formatted contents note |
Table of Contents<br/>Purpose of the Book xvii<br/><br/>Target Audience xix<br/><br/>Structure of the Book xxi<br/><br/>Foreword by Wil Bennett xxiii<br/><br/>Foreword by Gary McAlum xxv<br/><br/>Chapter 1 Governance, Risk Management, and Compliance 1<br/><br/>Chapter 2 The Landscape of Cybersecurity 19<br/><br/>Chapter 3 Cybersecurity Leadership: Insights and Best Practices 33<br/><br/>Chapter 4 Cybersecurity Program and Project Management 53<br/><br/>Chapter 5 Cybersecurity for Business Executives 69<br/><br/>Chapter 6 Cybersecurity and the Board of Directors 87<br/><br/>Chapter 7 Risk Management 109<br/><br/>Chapter 8 The NIST Risk Management Framework 131<br/><br/>Chapter 9 Cybersecurity Metrics 151<br/><br/>Chapter 10 Risk Assessments 171<br/><br/>Chapter 11 NIST Cybersecurity Framework 191<br/><br/>Chapter 12 Cybersecurity Frameworks 209<br/><br/>Chapter 13 NIST SP 800-53: Security and Privacy Controls Framework 231<br/><br/>Chapter 14 The FFIEC: An Introduction 245<br/><br/>Chapter 15 U.S. Federal Cybersecurity Regulations 267<br/><br/>Chapter 16 State-level Cybersecurity Regulations 287<br/><br/>Chapter 17 International Cybersecurity Laws and Regulations 299<br/><br/>Chapter 18 Privacy Laws and Their Intersection with Cybersecurity 315<br/><br/>Chapter 19 Auditing Cybersecurity: Guides for Auditors and the Audited 333<br/><br/>Chapter 20 The Challenging Role of the Regulator 355<br/><br/>Chapter 21 Understanding US Regulatory Bodies 377<br/><br/>Chapter 22 Managing Regulatory Visits and Requests for Information 395<br/><br/>Chapter 23 Understanding Regulatory Penalties 409<br/><br/>Chapter 24 Addressing and Remediating Regulatory Findings 429<br/><br/>Chapter 25 Cybersecurity Architecture 445<br/><br/>Chapter 26 Risk Mitigation 463<br/><br/>Chapter 27 Cloud Security 481<br/><br/>Chapter 28 Artificial Intelligence in Cybersecurity 497<br/><br/>Chapter 29 Quantum Computing: A New Frontier 511<br/><br/>Chapter 30 Incident Response and Recovery 521<br/><br/>Chapter 31 Navigating the Cyber Insurance Maze 541<br/><br/>Glossary 549<br/><br/>Cybersecurity Resources 555<br/><br/>Ready to Use KPI Examples 567<br/><br/>Ready to Use KRI Examples 599<br/><br/>The End 631<br/><br/>Index 633 |
520 ## - SUMMARY, ETC. |
Summary, etc |
"Cyber Security Governance & Risk Management is the monitoring of compliance with agreed cyber security policies and the assessment and management of relevant risks. Cybersecurity is a critical concern for modern businesses, and understanding how to navigate it is vital"-- |
Assigning source |
Provided by publisher. |
545 0# - BIOGRAPHICAL OR HISTORICAL DATA |
Biographical or historical note |
About the Author<br/>Dr. Jason Edwards, DM, CISSP, CRISC, is an esteemed cybersecurity expert and accomplished industry leader with over 25 years in cybersecurity, risk, and compliance, backed by a specialized doctorate in Cybersecurity Regulatory Risk and Compliance. A prolific educator and influencer, Dr. Edwards contributes as an Adjunct Cyber Professor at multiple universities and is recognized as a leading cybersecurity voice on LinkedIn. His portfolio includes many publications, including the notable Cyber Spear educational newsletter. In addition to his remarkable professional achievements, Dr. Edwards proudly served as a distinguished combat veteran and premier military cyber officer.<br/><br/>Griffin Weaver, JD, serves as the Managing Legal Director at a renowned technology company and is also a respected Adjunct Professor specializing in Cybersecurity Law. With a rich background encompassing various technical and managerial roles in IT, Griffin seamlessly transitioned into a flourishing legal career after earning his law degree from the University of Utah. As an acknowledged thought leader, Griffin has enhanced the domain with his scholarly contributions through numerous articles. He is a sought-after speaker renowned for his insightful presentations at cybersecurity conferences. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Business enterprises |
General subdivision |
Computer networks |
-- |
Security measures. |
Authority record control number |
https://id.loc.gov/authorities/subjects/sh95010367. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security. |
Authority record control number |
https://id.loc.gov/authorities/subjects/sh90001862. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer crimes |
General subdivision |
Prevention. |
Authority record control number |
https://id.loc.gov/authorities/subjects/sh2008117723. |
655 #4 - INDEX TERM--GENRE/FORM |
Genre/form data or focus term |
Electronic books. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Weaver, Griffin, |
Authority record control number |
https://id.loc.gov/authorities/names/n2024010540 |
Relator term |
author. |
856 ## - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226 |
Link text |
Full text is available at Wiley Online Library Click here to view |
942 ## - ADDED ENTRY ELEMENTS |
Source of classification or shelving scheme |
|
Item type |
EBOOK |