The Book

The Art and Science of Building a Simplified Digital Security Program

A subject such as this should not be done off the side of someone’s desk. This shortfall can often be attributed to the overwhelming number of tasks needed to achieve corporate goals and objectives. Given that almost all organizational activities today require digital engagement, it’s no wonder we frequently see cyber incidents making headlines. 

Here’s a glimpse of what’s inside: 

Section 1 – RISK: Discusses the intricacies of risk management, including risk appetite and tolerance, treatment, and the importance of maintaining a risk register and fostering a risk-aware culture. 

Section 2 – CLASS: Introduces a unique approach to classifying data assets, essential for risk identification, security architecture, and developing control documents. This section also explores structured and unstructured data and the concept of a record. 

Section 3 – DESIGN: Explores IT Governance and Security Architecture, detailing how IT security fits into the organizational structure, governance authority, and using a reference architecture to guide secure implementations. 

Section 4 – CONTROLS: Breaks down the elements of a robust digital security policy, including policies, standards, procedures, guidance, and baselines. This section also offers comprehensive details on supporting components required to ensure policy effectiveness. 

Section 5 – IMPLEMENTATION: Outlines key components for bringing a digital security program to life, including forming advisory groups and navigating the approval process. It also stresses resilience over searching for a “silver bullet” solution (which doesn’t exist). 

By the end of this book, you’ll have a clear understanding of how to formalize your digital security program using the CyberDynamX method. Materials have been developed that support the ideas in the book, which are also available to kick start your program.  

Purchase my book at your favourite book store