Cyber risk management : prioritize threats, identify vulnerabilities and apply controls /

"How can you manage the complex threats that can cause financial, operational and reputational damage to the business? This practical guide shows how to implement a successful cybersecurity programme. The second edition of Cyber Risk Management covers the latest developments in cybersecurity fo...

Full description

Saved in:
Bibliographic Details
Main Authors: Hodson, Christopher J. (Author)
Published: Kogan Page,
Publisher Address: London, United Kingdom :
Publication Dates: 2024.
Literature type: Book
Language: English
Edition: Second edition.
Subjects:
Summary: "How can you manage the complex threats that can cause financial, operational and reputational damage to the business? This practical guide shows how to implement a successful cybersecurity programme. The second edition of Cyber Risk Management covers the latest developments in cybersecurity for those responsible for managing threat events, vulnerabilities and controls. These include the impact of Web3 and the metaverse on cybersecurity, supply-chain security in the gig economy and exploration of the global, macroeconomic conditions that affect strategies. It explains how Covid-19 and remote working changed the cybersecurity landscape." -- Back cover.
Carrier Form: xii, 431 pages : illustrations, forms ; 24 cm
Bibliography: Includes bibliographical references and index.
ISBN: 9781398613492
1398613495
9781398613515
1398613517
Index Number: HD31
CLC: TP393.08
F402.2
Call Number: F402.2/H692/2nd ed.
Contents: Part One. Contextualizing cybersecurity risk -- Why now? : the only constant is change -- Technologies and security challenges -- Data breaches -- Part Two. Cybersecurity programme management -- What are cybersecurity and cybercrime? -- Establishing a cybersecurity programme -- Part Three. Actors, events and vulnerabilities -- Threat actors -- Threat events -- Vulnerabilities -- Controls -- Part Four. Conclusion: the cybersecurity risk equation explained -- Cyber risk management: a conclusion -- References -- Index.