
- English
- ePUB (mobile friendly)
- Available on iOS & Android
How to Measure Anything in Cybersecurity Risk
About this book
A start-to-finish guide for realistically measuring cybersecurity risk
In the newly revised How to Measure Anything in Cybersecurity Risk, Second Edition, a pioneering information security professional and a leader in quantitative analysis methods delivers yet another eye-opening text applying the quantitative language of risk analysis to cybersecurity. In the book, the authors demonstrate how to quantify uncertainty and shed light on how to measure seemingly intangible goals. It's a practical guide to improving risk assessment with a straightforward and simple framework.
Advanced methods and detailed advice for a variety of use cases round out the book, which also includes:
- A new "Rapid Risk Audit" for a first quick quantitative risk assessment.
- New research on the real impact of reputation damage
- New Bayesian examples for assessing risk with little data
- New material on simple measurement and estimation, pseudo-random number generators, and advice on combining expert opinion
Dispelling long-held beliefs and myths about information security, How to Measure Anything in Cybersecurity Risk is an essential roadmap for IT security managers, CFOs, risk and compliance professionals, and even statisticians looking for novel new ways to apply quantitative techniques to cybersecurity.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Table of Contents
- Title Page
- Copyright
- Dedication
- Foreword for the Second Edition
- Acknowledgments
- Preface
- Introduction
- PART I: Why Cybersecurity Needs Better Measurements for Risk
- PART II: Evolving the Model of Cybersecurity Risk
- PART III: Cybersecurity Risk Management for the Enterprise
- APPENDIX A: Selected Distributions
- APPENDIX B: Guest Contributors
- Index
- End User License Agreement