My Account Log in

3 options

The cyber risk handbook : creating and measuring effective cybersecurity capabilities / Domenic Antonucci.

Ebook Central Academic Complete Available online

View online

Ebook Central College Complete Available online

View online

O'Reilly Online Learning: Academic/Public Library Edition Available online

View online
Format:
Book
Author/Creator:
Antonucci, Domenic, author.
Series:
Wiley finance series.
THEi Wiley ebooks.
Wiley Finance
THEi Wiley ebooks
Language:
English
Subjects (All):
Computer crimes.
Cyberspace--Security measures.
Cyberspace.
Physical Description:
1 online resource (451 pages).
Edition:
1st edition
Place of Publication:
Hoboken, New Jersey : Wiley, 2017.
System Details:
Access using campus network via VPN at home (THEi Users Only).
text file
Summary:
Actionable guidance and expert perspective for real-world cybersecurity The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world situations, and cross-functional solutions for enterprise-wide improvement. Beginning with an overview of counter-cyber evolution, the discussion quickly turns practical with design and implementation guidance for the range of capabilities expected of a robust cyber risk management system that is integrated with the enterprise risk management (ERM) system. Expert contributors from around the globe weigh in on specialized topics with tools and techniques to help any type or size of organization create a robust system tailored to its needs. Chapter summaries of required capabilities are aggregated to provide a new cyber risk maturity model used to benchmark capabilities and to road-map gap-improvement. Cyber risk is a fast-growing enterprise risk, not just an IT risk. Yet seldom is guidance provided as to what this means. This book is the first to tackle in detail those enterprise-wide capabilities expected by Board, CEO and Internal Audit, of the diverse executive management functions that need to team up with the Information Security function in order to provide integrated solutions. Learn how cyber risk management can be integrated to better protect your enterprise Design and benchmark new and improved practical counter-cyber capabilities Examine planning and implementation approaches, models, methods, and more Adopt a new cyber risk maturity model tailored to your enterprise needs The need to manage cyber risk across the enterprise—inclusive of the IT operations—is a growing concern as massive data breaches make the news on an alarmingly frequent basis. With a cyber risk management system now a business-necessary requirement, practitioners need to assess the effectiveness of their current system, and measure its gap-improvement over time in response to a dynamic and fast-moving threat landscape. The Cyber Risk Handbook brings the world's best thinking to bear on aligning that system to the enterprise and vice-a-versa. Every functional head of any organization must have a copy at-hand to understand their role in achieving that alignment.
Contents:
Introduction
Board cyber risk oversight
Principles behind cyber risk management
Cybersecurity policies and procedures
Cyber strategic performance management
Standards and frameworks for cybersecurity
Identifying, analyzing, and evaluating cyber risks
Treating cyber risks
Treating cyber risks using process capabilities
Treating cyber risks - using insurance and finance
Monitoring and review using key risk indicators (KRIs)
Cybersecurity incident and crisis management
Business continuity management and cybersecurity
External context and supply chain
Internal organization context
Culture and human factors
Legal and compliance
Assurance and cyber risk management
Information asset management for cyber
Physical security
Cybersecurity for operations and communications
Access control
Cybersecurity systems: acquisition, development, and maintenance
People risk management in the digital age
Cyber competencies and the cybersecurity officer
Human resources security
Epilogue.
Notes:
Includes index.
Includes bibliographical references and index.
Description based on online resource; title from PDF title page (ebrary, viewed April 25, 2017).
ISBN:
9781119309727
1119309727
9781119308959
111930895X
9781119309741
1119309743
OCLC:
981912077

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

Find

Home Release notes

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Find catalog Using Articles+ Using your account