Skip to main content

Cybersecurity Program Development for Business: The Essential Planning Guide

Cybersecurity Program Development for Business: The Essential Planning Guide

Chris Moschovitis

ISBN: 978-1-119-43001-8

May 2018

224 pages


Get answers to all your cybersecurity questions

In 2016, we reached a tipping point—a moment where the global and local implications of cybersecurity became undeniable. Despite the seriousness of the topic, the term ""cybersecurity"" still exasperates many people. They feel terrorized and overwhelmed. The majority of business people have very little understanding of cybersecurity, how to manage it, and what's really at risk.

This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles and responsibilities, this book walks the reader through each step of developing and implementing a cybersecurity program. Read cover-to-cover, it’s a thorough overview, but it can also function as a useful reference book as individual questions and difficulties arise.

  • Unlike other cybersecurity books, the text is not bogged down with industry jargon
  • Speaks specifically to the executive who is not familiar with the development or implementation of cybersecurity programs
  • Shows you how to make pragmatic, rational, and informed decisions for your organization
  • Written by a top-flight technologist with decades of experience and a track record of success

If you’re a business manager or executive who needs to make sense of cybersecurity, this book demystifies it for you. 

Related Resources


Request an Evaluation Copy for this title



About the Author

Chapter 1 Understanding Risk

Chapter 2 Everything You Always Wanted to Know About Tech  (But Were Afraid to Ask Your Kids)

Chapter 3 A Cybersecurity Primer

Chapter 4 Management, Governance, and Alignment

Chapter 5 Your Cyber Security Program: A High-Level Overview

Chapter 6 Assets

Chapter 7 Threats

Chapter 8 Vulnerabilities

Chapter 9 Environments

Chapter 10 Controls

Chapter 11 Incident Response Planning

Chapter 12 People

Chapter 13 Living Cybersecure!