000 03462nam a22002297a 4500
005 20251023221252.0
008 251023b |||||||| |||| 00| 0 eng d
020 _a9780197526576
082 _a005.8
_bFAL
100 _aFalco, Gregory
_925785
245 _aConfronting cyber risk:
_ban embedded endurance strategy for cybersecurity
260 _aNew York
_bOxford University Press
_c2022
300 _axi, 202 p.
365 _aUSD
_b32.99
500 _aTable of contents: 1 Why Is Cyber Risk an Issue?Get accessArrow Gregory Falco and Eric Rosenbach View chapter Expand2 Who Is Attacking Us?Get accessArrow Gregory Falco and Eric Rosenbach View chapter Expand3 How Do I Assess Our Cyber Risk?Get accessArrow Gregory Falco and Eric Rosenbach View chapter Expand4 What Do I Need to Know About Cyber Frameworks, Standards, and Laws?Get accessArrow Gregory Falco and Eric Rosenbach View chapter Expand5 Who Is Responsible for Cybersecurity?Get accessArrow Gregory Falco and Eric Rosenbach View chapter Expand6 What Risk Prevention Measures Can I Use?Get accessArrow Gregory Falco and Eric Rosenbach View chapter Expand7 What Risk Resilience Measures Can I Use?Get accessArrow Gregory Falco and Eric Rosenbach View chapter Expand8 How Do I Embed Cyber Risk Management in All Aspects of the Organization?Get accessArrow Gregory Falco and Eric Rosenbach View chapter ExpandConclusionGet accessArrow Gregory Falco and Eric Rosenbach View chapter [https://academic.oup.com/oxford-law-pro/book/41146]
520 _aConfronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity is a practical leadership handbook defining a new strategy for improving cybersecurity and mitigating cyber risk. Written by two leading experts with extensive professional experience in cybersecurity, the book provides CEOs and cyber newcomers alike with novel, concrete guidance on how to implement a cutting-edge strategy to mitigate an organization’s overall risk to malicious cyberattacks. Using short, real-world case studies, the book highlights the need to address attack prevention and the resilience of each digital asset while also accounting for an incident’s potential impact on overall operations. In a world of hackers, artificial intelligence, and persistent ransomware attacks, the Embedded Endurance strategy embraces the reality of interdependent digital assets and provides an approach that addresses cyber risk at both the micro level (people, networks, systems and data) and the macro level (the organization). Most books about cybersecurity focus entirely on technology; the Embedded Endurance strategy recognizes the need for sophisticated thinking about hardware and software while also extending beyond to address operational, reputational and litigation risk. This book both provides the reader with a solid grounding in important prevention-focused technologies—such as cloud-based security and intrusion detection—and emphasizes the important role of incident response. By implementing an Embedded Endurance strategy, you can guide your team to blunt major cyber incidents with preventative and resilience measures engaged systematically across your organization (https://academic.oup.com/oxford-law-pro/book/41146)
650 _aComputer security
650 _aComputer networks--Security measures
_95638
650 _aInternet--Security measures
_924852
650 _aRisk management
942 _cBK
_2ddc
999 _c10202
_d10202