The cyber risk handbook creating and measuring effective cybersecurity capabilities

"The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world situations, and cross-functional solutions for ent...

Full description

Bibliographic Details
Main Author: Antonucci, Domenic
Format: eBook
Language:English
Published: Hoboken, New Jersey John Wiley and Sons, Inc. 2017
Series:Wiley finance series
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 04769nmm a2200685 u 4500
001 EB001948848
003 EBX01000000000000001111750
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 111930895X 
020 |a 9781119308959 
020 |a 9781119309741 
020 |a 1119309743 
020 |a 9781119309727 
050 4 |a HD30.38 
050 4 |a HV6773 
100 1 |a Antonucci, Domenic 
245 0 0 |a The cyber risk handbook  |b creating and measuring effective cybersecurity capabilities  |c Domenic Antonucci 
260 |a Hoboken, New Jersey  |b John Wiley and Sons, Inc.  |c 2017 
300 |a 1 online resource 
505 0 |a Introduction -- Board cyber risk oversight -- Principles behind cyber risk management -- Cybersecurity policies and procedures -- Cyber strategic performance management -- Standards and frameworks for cybersecurity -- Identifying, analyzing, and evaluating cyber risks -- Treating cyber risks -- Treating cyber risks using process capabilities -- Treating cyber risks -- using insurance and finance -- Monitoring and review using key risk indicators (KRIs) -- Cybersecurity incident and crisis management -- Business continuity management and cybersecurity -- External context and supply chain -- Internal organization context -- Culture and human factors -- Legal and compliance -- Assurance and cyber risk management -- Information asset management for cyber -- Physical security -- Cybersecurity for operations and communications -- Access control -- Cybersecurity systems: acquisition, development, and maintenance -- People risk management in the digital age -- Cyber competencies and the cybersecurity officer -- Human resources security -- Epilogue 
505 0 |a Includes bibliographical references and index 
653 |a Criminalité informatique 
653 |a Risk management / fast 
653 |a Computer crimes / fast 
653 |a Business enterprises / Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh95010367 
653 |a Risk management / http://id.loc.gov/authorities/subjects/sh85114200 
653 |a Gestion du risque 
653 |a Business / Data processing / Security measures / fast 
653 |a Computer crimes / http://id.loc.gov/authorities/subjects/sh85029492 
653 |a Business / Data processing / Security measures 
653 |a Risk Management 
653 |a Gestion / Informatique / Sécurité / Mesures 
653 |a Cyberspace / Security measures / fast 
653 |a Cyberspace / Security measures / http://id.loc.gov/authorities/subjects/sh2021002499 
653 |a COMPUTER SCIENCE / General / bisacsh 
653 |a risk management / aat 
653 |a Business enterprises / Computer networks / Security measures / fast 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
490 0 |a Wiley finance series 
500 |a Includes index 
776 |z 9781119308805 
776 |z 1119308801 
776 |z 111930895X 
776 |z 1119309743 
776 |z 9781119308959 
776 |z 9781119309741 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781119308805/?ar  |x Verlag  |3 Volltext 
082 0 |a 331 
082 0 |a 368 
082 0 |a 005.8 
082 0 |a 658 
082 0 |a 500 
082 0 |a 364.1 
082 0 |a 338 
082 0 |a 330 
082 0 |a 658.155 
520 |a "The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world situations, and cross-functional solutions for enterprise-wide improvement. Beginning with an overview of counter-cyber evolution, the discussion quickly turns practical with design and implementation guidance for the range of capabilities expected of a robust cyber risk management system that is integrated with the enterprise risk management (ERM) system. Expert contributors from around the globe weigh in on specialized topics with tools and techniques to help any type or size of organization create a robust system tailored to its needs. Chapter summaries of required capabilities are aggregated to provide a new cyber risk maturity model used to benchmark capabilities and to road-map gap-improvement. Cyber risk is a fast-growing enterprise risk, not just an IT risk. Yet seldom is guidance provided as to what this means. This book is the first to tackle in detail those enterprise-wide capabilities expected by Board, CEO and Internal Audit, of the diverse executive management functions that need to team up with the Information Security function in order to provide integrated solutions."--Publisher's description