
Cyber Risk Management
Prioritize Threats, Identify Vulnerabilities and Apply Controls
- 448 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Cyber Risk Management
Prioritize Threats, Identify Vulnerabilities and Apply Controls
About this book
How can you manage the complex threats that can cause financial, operational and reputational damage to the business? This practical guide shows how to implement a successful cyber security programme. The second edition of Cyber Risk Management covers the latest developments in cyber security for those responsible for managing threat events, vulnerabilities and controls. These include the impact of Web3 and the metaverse on cyber security, supply-chain security in the gig economy and exploration of the global, macroeconomic conditions that affect strategies. It explains how COVID-19 and remote working changed the cybersecurity landscape. Cyber Risk Management presents a data-centric approach to cyber risk management based on business impact assessments, data classification, data flow modelling and assessing return on investment. It covers pressing developments in artificial intelligence, machine learning, big data and cloud mobility, and includes advice on dealing with malware, data leakage, insider threat and Denial-of-Service. With analysis on the innate human factors affecting cyber risk and awareness and the importance of communicating security effectively, this book is essential reading for all risk and cybersecurity professionals.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Praise for Cyber Risk Management 2nd edition
- Title Page
- Contents
- List of Figures
- List of Tables
- About the author
- List of contributors
- Preface
- Acknowledgements
- Part One Contextualizing cybersecurity risk
- 01 Why now? The only constant is change
- 02 Technologies and security challenges
- 03 Data breaches
- Part Two Cybersecurity programme management
- 04 What are cybersecurity and cybercrime?
- 05 Establishing a cybersecurity programme
- Part Three Actors, events and vulnerabilities
- 06 Threat actors
- 07 Threat events
- 08 Vulnerabilities
- 09 Controls
- Part Four Conclusion: the cybersecurity risk equation explained
- 10 Cyber risk management: a conclusion
- Index
- Copyright Page