Confronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity
 
Product details:

ISBN13:9780197526545
ISBN10:0197526543
Binding:Paperback
No. of pages:224 pages
Size:208x142x17 mm
Weight:272 g
Language:English
0
Category:

Confronting Cyber Risk

An Embedded Endurance Strategy for Cybersecurity
 
Publisher: OUP USA
Date of Publication:
 
Normal price:

Publisher's listprice:
GBP 23.49
Estimated price in HUF:
11 345 HUF (10 805 HUF + 5% VAT)
Why estimated?
 
Your price:

10 211 (9 725 HUF + 5% VAT )
discount is: 10% (approx 1 135 HUF off)
The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
Click here to subscribe.
 
Availability:

 
 
Short description:

Using real world examples from SolarWinds to the Colonial Pipeline attack, Confronting Cyber Risk provides CEOs and cyber newcomers alike with a cutting-edge strategy to mitigate an organization's operational, reputational, and litigational risk to malicious cyberattacks in an evolving cyber risk landscape.

Long description:
An adaptive cyber risk management guide from MIT scientist and Johns Hopkins professor Gregory Falco and "Cyber Czar" Eric Rosenbach

Cyberattacks continue to grow in number, intensity, and sophistication. While attackers persistently adapt, business leaders have suffered from employing the same cyber risk management strategies for decades. Organizations must learn how to move past temporary solutions and invest in long-term resiliency measures to thrive in the future cyber economy.

Confronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity is a practical leadership guidebook outlining a new strategy for improving organizational cybersecurity and mitigating cyber risk. Veteran cybersecurity experts Falco and Rosenbach introduce the Embedded Endurance strategy as a systems-level approach to cyber risk management which addresses interdependent components of organizational risk and prepares organizations for the inevitability of cyber threats over the long-term. Using real world examples from SolarWinds to the Colonial Pipeline attack, the authors extend beyond hardware and software to provide a thoughtful ten-step process for organizations to address the simultaneous operational, reputational, and litigation risks common to cyberattacks. They conclude with helpful "cryptograms" from the future, in which business leaders are confronted with the next generation of cyber risk challenges.

Clear and informative, Confronting Cyber Risk provides CEOs and cyber newcomers alike with concrete guidance on how to implement a cutting-edge strategy to mitigate an organization's overall risk to malicious cyberattacks in an evolving cyber risk landscape.

Confronting Cyber Risk presents a highly readable strategy for effectively managing cyber risk, with case studies and anecdotes from the frontline. A must-read for senior executives.
Table of Contents:
Preface
Chapter 1: Why Is Cyber Risk an Issue?
Chapter 2: Who Is Attacking Us?
Chapter 3: How Do I Assess Our Cyber Risk?
Chapter 4: What Do I Need to Know About Cyber Frameworks, Standards, and Laws?
Chapter 5: Who Is Responsible for Cybersecurity?
Chapter 6: What Risk Prevention Measures Can I Use?
Chapter 7: What Risk Resilience Measures Can I Use?
Chapter 8: How Do I Embed Cyber Risk Management in All Aspects of the Organization?
Conclusion