| 000 | 02791cam a2200445 i 4500 | ||
|---|---|---|---|
| 001 | 23367848 | ||
| 003 | n | ||
| 005 | 20250929134042.0 | ||
| 008 | 231030s2024 enka b 001 0 eng d | ||
| 010 | _a 2023949509 | ||
| 020 |
_a9781398613515 _q(hardcover) |
||
| 020 |
_a9781398613492 _q(paperback) |
||
| 020 |
_z9781398613508 _q(ebook) |
||
| 035 | _a23367848 | ||
| 035 | _a(OCoLC)1368339453 | ||
| 040 |
_aYDX _beng _erda _cYDX _dBDX _dOCLCO _dOCLCQ _dVMC _dDLC |
||
| 042 | _alccopycat | ||
| 050 | 0 | 0 |
_aHD31.2 _b.H63 2024 |
| 082 | _a005.8 H63 2024 | ||
| 100 | 1 |
_aHodson, Christopher J., _eauthor. |
|
| 245 | 1 | 0 |
_aCyber risk management : _bprioritize threats, identify vulnerabilities and apply controls / _cChristopher J Hodson. |
| 250 | _aSecond edition. | ||
| 264 | 1 |
_aLondon, United Kingdom ; _aNew York, NY, USA : _bKogan Page, _c2024. |
|
| 300 |
_axii, 431 pages : _billustrations ; _c24 cm |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_aunmediated _bn _2rdamedia |
||
| 338 |
_avolume _bnc _2rdacarrier |
||
| 504 | _aIncludes bibliographical references and index. | ||
| 505 | 0 | _aPart One. Contextualizing cybersecurity risk -- Why now? : the only constant is change -- Technologies and security challenges -- Data breaches -- Part Two. Cybersecurity programme management -- What are cybersecurity and cybercrime? -- Establishing a cybersecurity programme -- Part Three. Actors, events and vulnerabilities -- Threat actors -- Threat events -- Vulnerabilities -- Controls -- Part Four. Conclusion: the cybersecurity risk equation explained -- Cyber risk management: a conclusion -- References -- Index. | |
| 520 | _a"How can you manage the complex threats that can cause financial, operational and reputational damage to the business? This practical guide shows how to implement a successful cybersecurity programme. The second edition of Cyber Risk Management covers the latest developments in cybersecurity for those responsible for managing threat events, vulnerabilities and controls. These include the impact of Web3 and the metaverse on cybersecurity, supply-chain security in the gig economy and exploration of the global, macroeconomic conditions that affect strategies. It explains how Covid-19 and remote working changed the cybersecurity landscape." -- Back cover. | ||
| 650 | 0 | _aIndustrial management. | |
| 650 | 0 |
_aCyberspace _xSecurity measures _xManagement. |
|
| 650 | 0 |
_aCyberterrorism _xPrevention. |
|
| 650 | 7 |
_aCyberterrorism _xPrevention. _2fast _0(OCoLC)fst01905567 |
|
| 650 | 7 |
_aIndustrial management. _2fast _0(OCoLC)fst00971246 |
|
| 906 |
_a7 _bcbc _ccopycat _d2 _encip _f20 _gy-gencatlg |
||
| 942 |
_2ddc _cBK-EN _n0 |
||
| 999 |
_c7944 _d7944 |
||