| 000 | 03462nam a22002297a 4500 | ||
|---|---|---|---|
| 005 | 20251023221252.0 | ||
| 008 | 251023b |||||||| |||| 00| 0 eng d | ||
| 020 | _a9780197526576 | ||
| 082 |
_a005.8 _bFAL |
||
| 100 |
_aFalco, Gregory _925785 |
||
| 245 |
_aConfronting cyber risk: _ban embedded endurance strategy for cybersecurity |
||
| 260 |
_aNew York _bOxford University Press _c2022 |
||
| 300 | _axi, 202 p. | ||
| 365 |
_aUSD _b32.99 |
||
| 500 | _aTable of contents: 1 Why Is Cyber Risk an Issue?Get accessArrow Gregory Falco and Eric Rosenbach View chapter Expand2 Who Is Attacking Us?Get accessArrow Gregory Falco and Eric Rosenbach View chapter Expand3 How Do I Assess Our Cyber Risk?Get accessArrow Gregory Falco and Eric Rosenbach View chapter Expand4 What Do I Need to Know About Cyber Frameworks, Standards, and Laws?Get accessArrow Gregory Falco and Eric Rosenbach View chapter Expand5 Who Is Responsible for Cybersecurity?Get accessArrow Gregory Falco and Eric Rosenbach View chapter Expand6 What Risk Prevention Measures Can I Use?Get accessArrow Gregory Falco and Eric Rosenbach View chapter Expand7 What Risk Resilience Measures Can I Use?Get accessArrow Gregory Falco and Eric Rosenbach View chapter Expand8 How Do I Embed Cyber Risk Management in All Aspects of the Organization?Get accessArrow Gregory Falco and Eric Rosenbach View chapter ExpandConclusionGet accessArrow Gregory Falco and Eric Rosenbach View chapter [https://academic.oup.com/oxford-law-pro/book/41146] | ||
| 520 | _aConfronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity is a practical leadership handbook defining a new strategy for improving cybersecurity and mitigating cyber risk. Written by two leading experts with extensive professional experience in cybersecurity, the book provides CEOs and cyber newcomers alike with novel, concrete guidance on how to implement a cutting-edge strategy to mitigate an organization’s overall risk to malicious cyberattacks. Using short, real-world case studies, the book highlights the need to address attack prevention and the resilience of each digital asset while also accounting for an incident’s potential impact on overall operations. In a world of hackers, artificial intelligence, and persistent ransomware attacks, the Embedded Endurance strategy embraces the reality of interdependent digital assets and provides an approach that addresses cyber risk at both the micro level (people, networks, systems and data) and the macro level (the organization). Most books about cybersecurity focus entirely on technology; the Embedded Endurance strategy recognizes the need for sophisticated thinking about hardware and software while also extending beyond to address operational, reputational and litigation risk. This book both provides the reader with a solid grounding in important prevention-focused technologies—such as cloud-based security and intrusion detection—and emphasizes the important role of incident response. By implementing an Embedded Endurance strategy, you can guide your team to blunt major cyber incidents with preventative and resilience measures engaged systematically across your organization (https://academic.oup.com/oxford-law-pro/book/41146) | ||
| 650 | _aComputer security | ||
| 650 |
_aComputer networks--Security measures _95638 |
||
| 650 |
_aInternet--Security measures _924852 |
||
| 650 | _aRisk management | ||
| 942 |
_cBK _2ddc |
||
| 999 |
_c10202 _d10202 |
||