Cyber risk management : prioritize threats, identify vulnerabilities and apply controls / Christopher J Hodson.

By: Material type: TextPublisher: London, United Kingdom ; New York, NY, USA : Kogan Page, 2024Edition: Second editionDescription: xii, 431 pages : illustrations ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781398613515
  • 9781398613492
Subject(s): DDC classification:
  • 005.8 H63 2024
LOC classification:
  • HD31.2 .H63 2024
Contents:
Part One. Contextualizing cybersecurity risk -- Why now? : the only constant is change -- Technologies and security challenges -- Data breaches -- Part Two. Cybersecurity programme management -- What are cybersecurity and cybercrime? -- Establishing a cybersecurity programme -- Part Three. Actors, events and vulnerabilities -- Threat actors -- Threat events -- Vulnerabilities -- Controls -- Part Four. Conclusion: the cybersecurity risk equation explained -- Cyber risk management: a conclusion -- References -- Index.
Summary: "How can you manage the complex threats that can cause financial, operational and reputational damage to the business? This practical guide shows how to implement a successful cybersecurity programme. The second edition of Cyber Risk Management covers the latest developments in cybersecurity for those responsible for managing threat events, vulnerabilities and controls. These include the impact of Web3 and the metaverse on cybersecurity, supply-chain security in the gig economy and exploration of the global, macroeconomic conditions that affect strategies. It explains how Covid-19 and remote working changed the cybersecurity landscape." -- Back cover.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Copy number Status Barcode
English Book WOMEN 005.8 H63 2024 (Browse shelf(Opens below)) C2 Available 1000000016251
English Book CENTRAL 005.8 H63 2024 (Browse shelf(Opens below)) Available 1000000020303

Includes bibliographical references and index.

Part One. Contextualizing cybersecurity risk -- Why now? : the only constant is change -- Technologies and security challenges -- Data breaches -- Part Two. Cybersecurity programme management -- What are cybersecurity and cybercrime? -- Establishing a cybersecurity programme -- Part Three. Actors, events and vulnerabilities -- Threat actors -- Threat events -- Vulnerabilities -- Controls -- Part Four. Conclusion: the cybersecurity risk equation explained -- Cyber risk management: a conclusion -- References -- Index.

"How can you manage the complex threats that can cause financial, operational and reputational damage to the business? This practical guide shows how to implement a successful cybersecurity programme. The second edition of Cyber Risk Management covers the latest developments in cybersecurity for those responsible for managing threat events, vulnerabilities and controls. These include the impact of Web3 and the metaverse on cybersecurity, supply-chain security in the gig economy and exploration of the global, macroeconomic conditions that affect strategies. It explains how Covid-19 and remote working changed the cybersecurity landscape." -- Back cover.

There are no comments on this title.

to post a comment.