Technical ReportPDF Available

CYBERSECURITY WORKFORCE HANDBOOK A Practical Guide to Managing Your Workforce

Authors:
  • NRD Cyber Security

Abstract and Figures

The strategic management of the workforce in any enterprise must be based upon a clear understanding of, and linkage to, enterprise strategy. In the case of securing data, systems and infrastructure, this means that workforce planning must align with a comprehensive cybersecurity strategy. While this field has often been considered a subset of the CIO function and the IT department, it is now clear that an enterprise cannot be properly secured without a broader effort.
Content may be subject to copyright.
A preview of the PDF is not available
ResearchGate has not been able to resolve any citations for this publication.
Cybersecurity Incident Response: Are we as prepared as we think? Research Report, Ponemon Institute
  • Ponemon Institute
Ponemon Institute LLC. 2014. Cybersecurity Incident Response: Are we as prepared as we think? Research Report, Ponemon Institute. Accessed September 11, 2014. http://www.lancope.com/files/documents/Industry-Reports/Lancope-Ponemon-Report-Cyber-Security-Incident-Response.pdf.
Meeting the Cyber Risk Challenge
Harvard Business Review. 2013. Meeting the Cyber Risk Challenge. Harvard Business Review Analytic Services Report, Harvard Business School Publishing.
Guide to Applying the Risk Management Framework to Federal Information Systems
ii National Institute of Standards and Technology. 2010. Guide to Applying the Risk Management Framework to Federal Information Systems. NIST Special Publication, NIST U.S. Chamber of Commerce. http://csrc.nist.gov/publications/nistpubs/800-37-rev1/sp800-37-rev1-final.pdf.
Professionalizing Cybersecurity: A path to universal standards and status
  • Sean Xvii Kern
  • Francesca Spidalieri
xvii Kern, Sean, and Francesca Spidalieri. 2014. Professionalizing Cybersecurity: A path to universal standards and status. Report, Newport, RI: Salve Regina University, Pell Center for International Relations and Public Policy.
  • Verizon Communications
x Verizon Communications. 2014. 2014 Data Breach Investigations Report. Report, Verizon Communications.
Developing a Security Awareness Culture-Improving Security Decision Making. SANS Whitepaper, SANS Institute. http://www.sans.org/reading- room/whitepapers/awareness/developing-security-awareness-culture-improving-security- decision-making-1526
  • Chris Garrett
Garrett, Chris. 2004. Developing a Security Awareness Culture-Improving Security Decision Making. SANS Whitepaper, SANS Institute. http://www.sans.org/reading- room/whitepapers/awareness/developing-security-awareness-culture-improving-security- decision-making-1526.
Lloyd's Risk Index 2013. Ipsos SA Cybersecurity Incident Response: Are we as prepared as we think? Research Report, Ponemon Institute
  • Iii Lloyd 's
iii Lloyd's. 2013. Lloyd's Risk Index 2013. Ipsos SA. Accessed September 11, 2014. http://www.lloyds.com/~/media/Files/News%20and%20Insight/Risk%20Insight/Risk%20Index%20 2013/Report/Lloyds%20Risk%20Index%202013report100713.pdf. iv Ponemon Institute LLC. 2014. Cybersecurity Incident Response: Are we as prepared as we think? Research Report, Ponemon Institute. Accessed September 11, 2014. http://www.lancope.com/files/documents/Industry-Reports/Lancope-Ponemon-Report-Cyber- Security-Incident-Response.pdf.
Boards of Directors, Corporate Governance and Cyber-Risks: Sharpening the FocusCyber Risks and the Boardroom
  • Luis A Aguilar
Aguilar, Luis A. 2014. "Boards of Directors, Corporate Governance and Cyber-Risks: Sharpening the Focus." "Cyber Risks and the Boardroom" Conference. New York, New York, June 10. http://www.sec.gov/News/Speech/Detail/Speech/1370542057946#_edn12.
Defending yesterday Key findings from the Global State of Information Security Survey
  • Llp Pricewaterhousecoopers
PricewaterhouseCoopers LLP. 2014. Defending yesterday Key findings from the Global State of Information Security Survey 2014. Survey Report, PricewaterhouseCoopers.