You are on page 1of 2

book

review
Transforming Cybersecurity
Transforming Cybersecurity, published by ISACA®, The day-to-day business of cyber security is IT-
should be read in the context of COBIT® 5 for centric, and COBIT 5 can help senior management
Information Security and the COBIT® 5 framework. support and budget the implementation of
Transforming Cybersecurity is a useful handbook cyber security strategies. The financial impact of
for any cyber security practitioner, information cybercrime justifies rethinking cyber security. This
security manager (ISM) or IT auditor. The book book describes the legal and regulatory impacts, in
explains that cyber security is a management task addition to societal impacts, of cybercrime in detail.
and encompasses all that protects enterprises It is also important to identify systemic weaknesses
and individuals from attacks and breaches in to understand how attacks and security breaches
a connected environment. The governance, happen. The book provides a list of typical threats,
management, and assurance of vulnerabilities and risk, which is very
cyber security are iterative and useful for security practitioners.
evolving processes.
Transforming Cybersecurity explains
The focus of cyber security the risk-based categorization of
should be on advanced persistent organizational controls, social
threats (APTs), cyberwarfare and controls, technical controls and
the impact on individuals. The process controls, along with the
tasks and responsibilities linked COBIT 5 processes that apply
to cyber security are essential to cyber security. Attack and
for an organization’s survival and incident data should be treated
profitability. The integration of these as learning materials and not just
tasks with COBIT would enable forensic evidence. Past attacks and
enterprises and individuals to incidents should be analyzed and
harmonize security strategies in a systematic way. integrated into the risk management process.
Among the types of risk discussed in this book
Transforming Cybersecurity discusses the preparing, are organizational design and structural risk;
investigating, responding and transforming (PIRT) governance, compliance and control risk; cultural
security life cycle approach along with the approach risk; social risk; people risk; risk associated with
to transform organizational security to strengthen human factors and all forms of technical risk.
defenses and integrate cyber security with security
governance, risk and compliance management. The publication also explains developing a business
Transforming Cybersecurity discusses various threats case for a cyber security governance framework
such as APTs, cyberwarfare, political activism and and the application of the five COBIT 5 Principles
damage to reputation. for better cyber security governance. COBIT® 5
for Information Security provides a general catalog
of information security principles, which are
Reviewed by Ravi Ayappa, Ph.D., CISA, CRISC, CISM, enumerated in detail in Transforming Cybersecurity.
who is currently a principal security consultant with Cognizant Technology
Solutions based in the United States. Over the last 20 years of his career, he A cyber security policy should give a sense of
has worked in the domains of governance, risk and compliance consulting,
direction and mission rather than outlining any
Internet of Things security, infrastructure security, application security,
lower-level management practices and activities.
business continuity planning and disaster recovery, and information and
communications technology security in Asia, Europe and the United States This book details the components of a cyber
across various industries and the military. He is also a voluntary instructor security policy along with the cyber security
for certification courses at the ISACA® Detroit (Michigan, USA) Chapter. management processes across COBIT 5. Even
though cyber security forms part of a corporate

ISACA JOURNAL VOL 4 1


©2017 ISACA. All rights reserved. www.isaca.org
security function, security as a whole is more of process, social and behavioral contexts and
a sociotechnical function. The book addresses the relative risk position with regard to attacks,
Enjoying security management from the strategic outlook breaches and incidents. Cyber security measures
this article? to the day-to-day practices and activities required applied to the COBIT 5 framework should be
to implement and maintain cyber security in an regularly evaluated for their systemic significance,
• Learn more about, organizational context. This book explains the their interdependencies with other security
discuss and necessary people, skills and competencies for measures and overall risk vs. expected benefits.
collaborate on security managers and end users, along with a The book describes eight guiding principles
cyber security in the cyber security training program. of transforming cyber security, including the
Knowledge Center. establishment of cyber security governance, end-
www.isaca.org/ Assurance ensures that cyber security is designed, user behavioral patterns and cultural values.
cybersecurity-topic implemented, maintained and transformed in
a manner that is consistent with all aspects of Appendix A of the book gives details of the
governance, risk and compliance. The book mappings of COBIT 5 and COBIT® 5 for Information
explains that cyber security should be reviewed Security to cyber security. Appendix B covers
frequently to validate the overall control set in terms intelligence, investigations and forensics in cyber
of design and effectiveness. Management, risk security. The authors of this book provide detailed,
management and internal audit are the three lines step-by-step guidance to address cyber security
of defense in the review process. Auditors should issues and apply the relevant parts of COBIT 5 to
be fully trained in the collection and preservation of those issues.
evidence and understand the nuances applicable in
any particular jurisdiction before attempting forensic Editor’s Note
or investigative work.
Transforming Cybersecurity is available
Transforming Cybersecurity shows that from an from the ISACA® Bookstore. For information,
end-to-end perspective of the enterprise, cyber visit www.isaca.org/bookstore, email bookstore@
security will transform the organizational, technical, isaca.org or telephone +1.847.660.5650.

ISACA JOURNAL VOL 4 2


©2017 ISACA. All rights reserved. www.isaca.org

You might also like