Amazon cover image
Image from Amazon.com

Confronting cyber risk: an embedded endurance strategy for cybersecurity

By: Material type: TextTextPublication details: New York Oxford University Press 2022Description: xi, 202 pISBN:
  • 9780197526576
Subject(s): DDC classification:
  • 005.8 FAL
Summary: Confronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity is a practical leadership handbook defining a new strategy for improving cybersecurity and mitigating cyber risk. Written by two leading experts with extensive professional experience in cybersecurity, the book provides CEOs and cyber newcomers alike with novel, concrete guidance on how to implement a cutting-edge strategy to mitigate an organization’s overall risk to malicious cyberattacks. Using short, real-world case studies, the book highlights the need to address attack prevention and the resilience of each digital asset while also accounting for an incident’s potential impact on overall operations. In a world of hackers, artificial intelligence, and persistent ransomware attacks, the Embedded Endurance strategy embraces the reality of interdependent digital assets and provides an approach that addresses cyber risk at both the micro level (people, networks, systems and data) and the macro level (the organization). Most books about cybersecurity focus entirely on technology; the Embedded Endurance strategy recognizes the need for sophisticated thinking about hardware and software while also extending beyond to address operational, reputational and litigation risk. This book both provides the reader with a solid grounding in important prevention-focused technologies—such as cloud-based security and intrusion detection—and emphasizes the important role of incident response. By implementing an Embedded Endurance strategy, you can guide your team to blunt major cyber incidents with preventative and resilience measures engaged systematically across your organization (https://academic.oup.com/oxford-law-pro/book/41146)
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Copy number Status Date due Barcode
Book Book Indian Institute of Management LRC General Stacks IT & Decisions Sciences 005.8 FAL (Browse shelf(Opens below)) 1 Available 009155

Table of contents:
1 Why Is Cyber Risk an Issue?Get accessArrow
Gregory Falco and Eric Rosenbach
View chapter
Expand2 Who Is Attacking Us?Get accessArrow
Gregory Falco and Eric Rosenbach
View chapter
Expand3 How Do I Assess Our Cyber Risk?Get accessArrow
Gregory Falco and Eric Rosenbach
View chapter
Expand4 What Do I Need to Know About Cyber Frameworks, Standards, and Laws?Get accessArrow
Gregory Falco and Eric Rosenbach
View chapter
Expand5 Who Is Responsible for Cybersecurity?Get accessArrow
Gregory Falco and Eric Rosenbach
View chapter
Expand6 What Risk Prevention Measures Can I Use?Get accessArrow
Gregory Falco and Eric Rosenbach
View chapter
Expand7 What Risk Resilience Measures Can I Use?Get accessArrow
Gregory Falco and Eric Rosenbach
View chapter
Expand8 How Do I Embed Cyber Risk Management in All Aspects of the Organization?Get accessArrow
Gregory Falco and Eric Rosenbach
View chapter
ExpandConclusionGet accessArrow
Gregory Falco and Eric Rosenbach
View chapter

[https://academic.oup.com/oxford-law-pro/book/41146]

Confronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity is a practical leadership handbook defining a new strategy for improving cybersecurity and mitigating cyber risk. Written by two leading experts with extensive professional experience in cybersecurity, the book provides CEOs and cyber newcomers alike with novel, concrete guidance on how to implement a cutting-edge strategy to mitigate an organization’s overall risk to malicious cyberattacks. Using short, real-world case studies, the book highlights the need to address attack prevention and the resilience of each digital asset while also accounting for an incident’s potential impact on overall operations. In a world of hackers, artificial intelligence, and persistent ransomware attacks, the Embedded Endurance strategy embraces the reality of interdependent digital assets and provides an approach that addresses cyber risk at both the micro level (people, networks, systems and data) and the macro level (the organization). Most books about cybersecurity focus entirely on technology; the Embedded Endurance strategy recognizes the need for sophisticated thinking about hardware and software while also extending beyond to address operational, reputational and litigation risk. This book both provides the reader with a solid grounding in important prevention-focused technologies—such as cloud-based security and intrusion detection—and emphasizes the important role of incident response. By implementing an Embedded Endurance strategy, you can guide your team to blunt major cyber incidents with preventative and resilience measures engaged systematically across your organization

(https://academic.oup.com/oxford-law-pro/book/41146)

There are no comments on this title.

to post a comment.

©2025-26 Pragyata: Learning Resource Center. All Rights Reserved.
Indian Institute of Management Bodh Gaya
Uruvela, Prabandh Vihar, Bodh Gaya
Gaya, 824234, Bihar, India

Powered by Koha