Blog_BCM_B2.jpg

xx [Book] A Manager’s Guide to Business Continuity Management for Cybersecurity Incident Response

A "Specialist" book series from BCM Institute authored by Dr Goh Moh Heng.  Each book is a detailed look into the seven phases of the BCM planning methodology.
Moh Heng Goh

The BCM Specialist Book Series is a comprehensive collection that delves into specialized topics within Business Continuity Management (BCM).

Each book in this series focuses on a specific aspect of BCM, providing in-depth insights, practical guidance, and expert perspectives.

Whether you're looking to enhance your knowledge of crisis management, crisis communication, BCM auditing, IT disaster recovery, operational resilience, operational resilience auditing, or implementing BCM standards like ISO22301, the BCM Specialist Book Series offers valuable resources for BCM professionals at all levels.

New call-to-action

A Manager’s Guide to Business Continuity Management for Cybersecurity Incident Response

 

Description

ISBN 978-981-11-4158-4
Published Year: 2017A Manager’s Guide to BCM for Cybersecurity Incident Response

This book will guide organisations to effectively and closely manage cybersecurity incidents, operating with business continuity management (BCM) practices.

Clear descriptions are provided on how the BCM team can incorporate cybersecurity incident response (CIR) into the BCM planning methodology processes.

The book explains how cybersecurity incident response involves and integrates with all components within the organisation and its relation to terminologies such as crisis communication (CC), crisis management (CM) and IT disaster recovery (IT DR).

Accomplish the following:

  • Define cybersecurity and the related BC terminologies
  • Understand the relationship between CIR and BCM practices
  • Review the team structure to tackle cybersecurity threats
  • Align the relevant ISO and BCM standards to enhance the cyber security program
  • Integrate cybersecurity-specific threat assessment into the BCM response plans
  • Review the continuity of critical products and services based on cybersecurity threats
  • Develop appropriate mitigation and cybersecurity response strategies
  • Measure and test the effectiveness of the CIR plan with BCM response
  • Maintain relevancy and continual improvement of BCM plan for CIR

 Select Book Series

New call-to-action New call-to-action New call-to-action

 

 

Your Comments Here:

 

More Posts

New Call-to-action