• Contact

  • Newsletter

  • About us

  • Delivery options

  • Prospero Book Market Podcast

  • News

  • 0
    Confronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity

    Confronting Cyber Risk by Falco, Gregory J.; Rosenbach, Eric;

    An Embedded Endurance Strategy for Cybersecurity

      • GET 20% OFF

      • The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
      • Publisher's listprice GBP 23.49
      • The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.

        11 888 Ft (11 322 Ft + 5% VAT)
      • Discount 20% (cc. 2 378 Ft off)
      • Discounted price 9 510 Ft (9 058 Ft + 5% VAT)

    11 888 Ft

    db

    Availability

    Estimated delivery time: In stock at the publisher, but not at Prospero's office. Delivery time approx. 3-5 weeks.
    Not in stock at Prospero.

    Why don't you give exact delivery time?

    Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.

    Product details:

    • Publisher OUP USA
    • Date of Publication 3 May 2022

    • ISBN 9780197526545
    • Binding Paperback
    • No. of pages224 pages
    • Size 208x142x17 mm
    • Weight 272 g
    • Language English
    • 541

    Categories

    Short description:

    Using real world examples from SolarWinds to the Colonial Pipeline attack, Confronting Cyber Risk provides CEOs and cyber newcomers alike with a cutting-edge strategy to mitigate an organization's operational, reputational, and litigational risk to malicious cyberattacks in an evolving cyber risk landscape.

    More

    Long description:

    An adaptive cyber risk management guide from MIT scientist and Johns Hopkins professor Gregory Falco and "Cyber Czar" Eric Rosenbach

    Cyberattacks continue to grow in number, intensity, and sophistication. While attackers persistently adapt, business leaders have suffered from employing the same cyber risk management strategies for decades. Organizations must learn how to move past temporary solutions and invest in long-term resiliency measures to thrive in the future cyber economy.

    Confronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity is a practical leadership guidebook outlining a new strategy for improving organizational cybersecurity and mitigating cyber risk. Veteran cybersecurity experts Falco and Rosenbach introduce the Embedded Endurance strategy as a systems-level approach to cyber risk management which addresses interdependent components of organizational risk and prepares organizations for the inevitability of cyber threats over the long-term. Using real world examples from SolarWinds to the Colonial Pipeline attack, the authors extend beyond hardware and software to provide a thoughtful ten-step process for organizations to address the simultaneous operational, reputational, and litigation risks common to cyberattacks. They conclude with helpful "cryptograms" from the future, in which business leaders are confronted with the next generation of cyber risk challenges.

    Clear and informative, Confronting Cyber Risk provides CEOs and cyber newcomers alike with concrete guidance on how to implement a cutting-edge strategy to mitigate an organization's overall risk to malicious cyberattacks in an evolving cyber risk landscape.

    Confronting Cyber Risk presents a highly readable strategy for effectively managing cyber risk, with case studies and anecdotes from the frontline. A must-read for senior executives.

    More

    Table of Contents:

    Preface
    Chapter 1: Why Is Cyber Risk an Issue?
    Chapter 2: Who Is Attacking Us?
    Chapter 3: How Do I Assess Our Cyber Risk?
    Chapter 4: What Do I Need to Know About Cyber Frameworks, Standards, and Laws?
    Chapter 5: Who Is Responsible for Cybersecurity?
    Chapter 6: What Risk Prevention Measures Can I Use?
    Chapter 7: What Risk Resilience Measures Can I Use?
    Chapter 8: How Do I Embed Cyber Risk Management in All Aspects of the Organization?
    Conclusion

    More
    Recently viewed
    previous
    Confronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity

    Confronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity

    Falco, Gregory J.; Rosenbach, Eric;

    11 888 HUF

    next