Confronting cyber risk: an embedded endurance strategy for cybersecurity
Material type:
TextPublication details: New York Oxford University Press 2022Description: xi, 202 pISBN: - 9780197526576
- 005.8 FAL
| Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode | |
|---|---|---|---|---|---|---|---|---|
Book
|
Indian Institute of Management LRC General Stacks | IT & Decisions Sciences | 005.8 FAL (Browse shelf(Opens below)) | 1 | Available | 009155 |
Browsing Indian Institute of Management LRC shelves, Shelving location: General Stacks, Collection: IT & Decisions Sciences Close shelf browser (Hides shelf browser)
Table of contents:
1 Why Is Cyber Risk an Issue?Get accessArrow
Gregory Falco and Eric Rosenbach
View chapter
Expand2 Who Is Attacking Us?Get accessArrow
Gregory Falco and Eric Rosenbach
View chapter
Expand3 How Do I Assess Our Cyber Risk?Get accessArrow
Gregory Falco and Eric Rosenbach
View chapter
Expand4 What Do I Need to Know About Cyber Frameworks, Standards, and Laws?Get accessArrow
Gregory Falco and Eric Rosenbach
View chapter
Expand5 Who Is Responsible for Cybersecurity?Get accessArrow
Gregory Falco and Eric Rosenbach
View chapter
Expand6 What Risk Prevention Measures Can I Use?Get accessArrow
Gregory Falco and Eric Rosenbach
View chapter
Expand7 What Risk Resilience Measures Can I Use?Get accessArrow
Gregory Falco and Eric Rosenbach
View chapter
Expand8 How Do I Embed Cyber Risk Management in All Aspects of the Organization?Get accessArrow
Gregory Falco and Eric Rosenbach
View chapter
ExpandConclusionGet accessArrow
Gregory Falco and Eric Rosenbach
View chapter
[https://academic.oup.com/oxford-law-pro/book/41146]
Confronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity is a practical leadership handbook defining a new strategy for improving cybersecurity and mitigating cyber risk. Written by two leading experts with extensive professional experience in cybersecurity, the book provides CEOs and cyber newcomers alike with novel, concrete guidance on how to implement a cutting-edge strategy to mitigate an organization’s overall risk to malicious cyberattacks. Using short, real-world case studies, the book highlights the need to address attack prevention and the resilience of each digital asset while also accounting for an incident’s potential impact on overall operations. In a world of hackers, artificial intelligence, and persistent ransomware attacks, the Embedded Endurance strategy embraces the reality of interdependent digital assets and provides an approach that addresses cyber risk at both the micro level (people, networks, systems and data) and the macro level (the organization). Most books about cybersecurity focus entirely on technology; the Embedded Endurance strategy recognizes the need for sophisticated thinking about hardware and software while also extending beyond to address operational, reputational and litigation risk. This book both provides the reader with a solid grounding in important prevention-focused technologies—such as cloud-based security and intrusion detection—and emphasizes the important role of incident response. By implementing an Embedded Endurance strategy, you can guide your team to blunt major cyber incidents with preventative and resilience measures engaged systematically across your organization
(https://academic.oup.com/oxford-law-pro/book/41146)
There are no comments on this title.