Developing Cybersecurity Programs and Policies

Access a start-to-finish guidance on how to establish an efficient and smart cybersecurity strategy in any organization.

(pearson-dev-cysec) / ISBN : 978-1-64459-006-5
Lessons
TestPrep
AI Tutor (Add-on)
35 Reviews
Get A Free Trial

About This Course

Up your cybersecurity program development with our comprehensive online course, based on the trusted Pearson book "Developing Cybersecurity Programs and Policies." Go beyond basic awareness with in-depth lessons on crafting strong cybersecurity policies, implementing industry frameworks (like NIST), and managing risk. We've got you covered, from securing your assets and preventing data loss to training your team and building a robust incident response plan.

Skills You’ll Get

  • Craft a strong and new cybersecurity policy.
  • Implement industry frameworks (like NIST)
  • Manage cybersecurity risk
  • Secure assets and prevent data loss
  • Train employees on cybersecurity best practices
  • Build a robust incident response plan

1

Introduction

2

Understanding Cybersecurity Policy and Governance

  • Information Security vs. Cybersecurity Policies
  • Looking at Policy Through the Ages
  • Cybersecurity Policy
  • Cybersecurity Policy Life Cycle
  • Summary
3

Cybersecurity Policy Organization, Format, and Styles

  • Policy Hierarchy
  • Writing Style and Technique
  • Policy Format
  • Summary
4

Cybersecurity Framework

  • Confidentiality, Integrity, and Availability
  • NIST's Cybersecurity Framework
  • Summary
5

Governance and Risk Management

  • Understanding Cybersecurity Policies
  • Cybersecurity Risk
  • Summary
6

Asset Management and Data Loss Prevention

  • Information Assets and Systems
  • Information Classification
  • Labeling and Handling Standards
  • Information Systems Inventory
  • Understanding Data Loss Prevention Technologies
  • Summary
7

Human Resources Security

  • The Employee Life Cycle
  • The Importance of Employee Agreements
  • The Importance of Security Education and Training
  • Summary
8

Physical and Environmental Security

  • Understanding the Secure Facility Layered Defense Model
  • Protecting Equipment
  • Summary
9

Communications and Operations Security

  • Standard Operating Procedures
  • Operational Change Control
  • Malware Protection
  • Data Replication
  • Secure Messaging
  • Activity Monitoring and Log Analysis
  • Service Provider Oversight
  • Threat Intelligence and Information Sharing
  • Summary
10

Access Control Management

  • Access Control Fundamentals
  • Infrastructure Access Controls
  • User Access Controls
  • Summary
11

Information Systems Acquisition, Development, and Maintenance

  • System Security Requirements
  • Secure Code
  • Cryptography
  • Summary
12

Cybersecurity Incident Response

  • Incident Response
  • What Happened? Investigation and Evidence Handling
  • Data Breach Notification Requirements
  • Summary
13

Business Continuity Management

  • Emergency Preparedness
  • Business Continuity Risk Management
  • The Business Continuity Plan
  • Plan Testing and Maintenance
  • Summary
14

Regulatory Compliance for Financial Institutions

  • The Gramm-Leach-Bliley Act
  • New York's Department of Financial Services Cybersecurity Regulation (23 NYCRR Part 500)
  • What Is a Regulatory Examination?
  • Personal and Corporate Identity Theft
  • Summary
15

Regulatory Compliance for the Health-Care Sector

  • The HIPAA Security Rule
  • The HITECH Act and the Omnibus Rule
  • Understanding the HIPAA Compliance Enforcement Process
  • Summary
16

PCI Compliance for Merchants

  • Protecting Cardholder Data
  • PCI Compliance
  • Summary
17

NIST Cybersecurity Framework

  • Introducing the NIST Cybersecurity Framework Components
  • The Framework Core
  • Framework Implementation Tiers ("Tiers")
  • NIST's Recommended Steps to Establish or Improve a Cybersecurity Program
  • NIST's Cybersecurity Framework Reference Tool
  • Adopting the NIST Cybersecurity Framework in Real Life
  • Summary
A

Appendix A: Cybersecurity Program Resources

Why Do Learners Love This Course?

As an expert reviewer of the uCertify Developing Cybersecurity Programs and Policies course curriculum, I’ve found that it provides a thorough overview of professional learning topics and resources required for developing a cybersecurity strategy within an organization.

Zoe Braiterman
Zoe Braiterman
Research Associate

Any questions?
Check out the FAQs

Still have unanswered questions and need to get in touch?

Contact Us Now

A cyber security policy is a set of guidelines that outlines how your organization will protect its data and information systems. It defines what information is considered confidential, establishes protocols for user access and data handling, and outlines procedures for responding to security incidents.

Cybersecurity professionals utilize a variety of programs and tools depending on their specific needs. These can include:

  • Antivirus and Anti-malware software
  • Firewalls
  • Intrusion Detection/Prevention Systems (IDS/IPS)
  • Data encryption software
  • Security Information and Event Management (SIEM) systems

Developing cyber security policies and procedures involves several steps:

  • Identify your assets: This includes all your hardware, software, data, and intellectual property.
  • Assess your risks: Evaluate the threats your organization faces and how likely they are to occur.
  • Develop policies and procedures: Create clear guidelines for how employees will access, use, and store data, along with procedures for incident response and reporting.
  • Implement and train: Roll out your policies to employees and provide training to ensure everyone understands their role in cybersecurity.
  • Test and update: Regularly test your policies and procedures and update them as needed to address new threats and vulnerabilities.

Building a cybersecurity program involves creating a comprehensive strategy that incorporates your policies and procedures.  Here's a simplified roadmap: Define goals and objectives: What do you want to achieve with your program? Protecting sensitive data? Ensuring compliance with regulations? Develop a security framework: This provides a structured approach to cybersecurity, like NIST or ISO 27001. Implement security controls: Put your policies and procedures into action using technical and non-technical controls. Incident response plan: Establish a plan for how to identify, contain, and recover from security incidents. Ongoing maintenance: Regularly monitor your systems, update software, conduct security awareness training, and review your program to ensure effectiveness.

Related Courses

All Course
scroll to top