Cyber Risk Management
Cyber Risk Management
Prioritize Threats, Identify Vulnerabilities and Apply Controls
Hodson, Christopher J
Kogan Page Ltd
02/2024
448
Mole
Inglês
9781398613492
15 a 20 dias
Descrição não disponível.
Section - PART ONE: Contextualizing cybersecurity risk;
Chapter - 01: Why now? The only constant is change;
Chapter - 02: Technologies and security challenges;
Chapter - 03: Data breaches;
Section - PART TWO: Cybersecurity programme management;
Chapter - 04: What are cybersecurity and cybercrime?;
Chapter - 05: Establishing a cybersecurity programme;
Section - PART THREE: Actors, events and vulnerabilities;
Chapter - 06: Threat actors;
Chapter - 07: Threat events;
Chapter - 08: Vulnerabilities;
Chapter - 09: Controls;
Section - PART FOUR: Conclusion: the cybersecurity risk equation explained;
Chapter - 10: Cyber risk management: a conclusion;
Chapter - 01: Why now? The only constant is change;
Chapter - 02: Technologies and security challenges;
Chapter - 03: Data breaches;
Section - PART TWO: Cybersecurity programme management;
Chapter - 04: What are cybersecurity and cybercrime?;
Chapter - 05: Establishing a cybersecurity programme;
Section - PART THREE: Actors, events and vulnerabilities;
Chapter - 06: Threat actors;
Chapter - 07: Threat events;
Chapter - 08: Vulnerabilities;
Chapter - 09: Controls;
Section - PART FOUR: Conclusion: the cybersecurity risk equation explained;
Chapter - 10: Cyber risk management: a conclusion;
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
cyber risk; cybersecurity; digital transformation; insurance risk management; business risk management; financial risk management; security risk management; enterprise risk management; risk analysis; cyber threats; cyber intelligence; security data; insurance data
Section - PART ONE: Contextualizing cybersecurity risk;
Chapter - 01: Why now? The only constant is change;
Chapter - 02: Technologies and security challenges;
Chapter - 03: Data breaches;
Section - PART TWO: Cybersecurity programme management;
Chapter - 04: What are cybersecurity and cybercrime?;
Chapter - 05: Establishing a cybersecurity programme;
Section - PART THREE: Actors, events and vulnerabilities;
Chapter - 06: Threat actors;
Chapter - 07: Threat events;
Chapter - 08: Vulnerabilities;
Chapter - 09: Controls;
Section - PART FOUR: Conclusion: the cybersecurity risk equation explained;
Chapter - 10: Cyber risk management: a conclusion;
Chapter - 01: Why now? The only constant is change;
Chapter - 02: Technologies and security challenges;
Chapter - 03: Data breaches;
Section - PART TWO: Cybersecurity programme management;
Chapter - 04: What are cybersecurity and cybercrime?;
Chapter - 05: Establishing a cybersecurity programme;
Section - PART THREE: Actors, events and vulnerabilities;
Chapter - 06: Threat actors;
Chapter - 07: Threat events;
Chapter - 08: Vulnerabilities;
Chapter - 09: Controls;
Section - PART FOUR: Conclusion: the cybersecurity risk equation explained;
Chapter - 10: Cyber risk management: a conclusion;
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.