Introduction
  • Introduction
  • The Cyberspace
  • Cybersecurity
  • Positions in cybersecurity
  • Confidentiality - Integrity - Availability
  • Information classification
  • Threats and vulnerabilities
  • Risk assessment
  • Treating risk
  • Support from top management
  • Internal organization
  • Segregation of duties
  • The Barings Bank collapse
  • Bring your own device (BYOD)
  • Mobile devices
  • Human resources security
  • Awareness and training
  • Asset management
  • Removable media
  • The interesting story of Edward Snowden
  • Access control
  • Privileged access rights
  • Logging and monitoring
  • Cryptography basics
  • Digital signature
  • Public key infrastructure
  • Cryptographic attacks
  • Physical security
  • Equipment
  • Malware
  • Ransomware
  • Phishing
  • Denial of service (DOS and DDOS)
  • Social engineering
  • Password management
  • Backup
  • Change management
  • Network security management
  • Email security
  • Security in development processes
  • Supplier relationships
  • The Target security breach
  • Capacity management
  • Incident management
  • The case of Uber
  • Business continuity management
  • Compliance
  • Looking to the future
  • ISO 27001. Cybersecurity manager