Cargando…

The cyber risk handbook : creating and measuring effective cybersecurity capabilities /

"The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world situations, and cross-functional solutions for ent...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Antonucci, Domenic (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken, New Jersey : John Wiley and Sons, Inc., 2017.
Colección:Wiley finance series
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ii 4500
001 OR_ocn981912077
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu|||unuuu
008 170407s2017 nyu ob 001 0 eng d
010 |a  2017302691 
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d N$T  |d YDX  |d EBLCP  |d DG1  |d IDEBK  |d UMI  |d CNCGM  |d STF  |d TOH  |d COO  |d OTZ  |d OCLCQ  |d VT2  |d OCLCO  |d DEBSZ  |d UCO  |d OCLCQ  |d OCLCO  |d MERUC  |d OCLCF  |d CEF  |d KSU  |d OCLCQ  |d Z@L  |d BRX  |d UKMGB  |d OCLCQ  |d WYU  |d RECBK  |d LVT  |d U3W  |d OCLCQ  |d UAB  |d UKAHL  |d OL$  |d OCLCQ  |d DG1  |d OCLCO  |d OCL  |d OCLCQ  |d OCLCO 
016 7 |a 018296605  |2 Uk 
019 |a 982105017  |a 982141719  |a 982231336  |a 982325754  |a 982394588  |a 985460556  |a 1017889470  |a 1066582378  |a 1103274729  |a 1111151093  |a 1129361278  |a 1152978796  |a 1192340581  |a 1228569153  |a 1240520663  |a 1244446622  |a 1244449038  |a 1249244725 
020 |a 9781119308959  |q (electronic bk.) 
020 |a 111930895X  |q (electronic bk.) 
020 |a 9781119309741  |q (electronic bk.) 
020 |a 1119309743  |q (electronic bk.) 
020 |a 9781119309727 
020 |a 1119309727 
020 |z 9781119308805 
020 |z 1119308801 
029 1 |a AU@  |b 000060076016 
029 1 |a AU@  |b 000060098393 
029 1 |a AU@  |b 000065314129 
029 1 |a AU@  |b 000066232381 
029 1 |a CHBIS  |b 011081406 
029 1 |a CHNEW  |b 000951784 
029 1 |a CHVBK  |b 484206796 
029 1 |a CHVBK  |b 502847492 
029 1 |a DEBSZ  |b 491140843 
029 1 |a GBVCP  |b 1004858787 
029 1 |a UKMGB  |b 018296605 
029 1 |a AU@  |b 000066526313 
035 |a (OCoLC)981912077  |z (OCoLC)982105017  |z (OCoLC)982141719  |z (OCoLC)982231336  |z (OCoLC)982325754  |z (OCoLC)982394588  |z (OCoLC)985460556  |z (OCoLC)1017889470  |z (OCoLC)1066582378  |z (OCoLC)1103274729  |z (OCoLC)1111151093  |z (OCoLC)1129361278  |z (OCoLC)1152978796  |z (OCoLC)1192340581  |z (OCoLC)1228569153  |z (OCoLC)1240520663  |z (OCoLC)1244446622  |z (OCoLC)1244449038  |z (OCoLC)1249244725 
037 |a CL0500000854  |b Safari Books Online 
050 4 |a HV6773 
050 4 |a HD30.38  |b .A58 2017 
072 7 |a COM  |x 000000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Antonucci, Domenic,  |e author. 
245 1 4 |a The cyber risk handbook :  |b creating and measuring effective cybersecurity capabilities /  |c Domenic Antonucci. 
264 1 |a Hoboken, New Jersey :  |b John Wiley and Sons, Inc.,  |c 2017. 
264 4 |c ©2017 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 0 |a Wiley finance series 
500 |a Includes index. 
588 0 |a Vendor-supplied metadata. 
504 |a Includes bibliographical references and index. 
505 0 |a Introduction -- Board cyber risk oversight -- Principles behind cyber risk management -- Cybersecurity policies and procedures -- Cyber strategic performance management -- Standards and frameworks for cybersecurity -- Identifying, analyzing, and evaluating cyber risks -- Treating cyber risks -- Treating cyber risks using process capabilities -- Treating cyber risks -- using insurance and finance -- Monitoring and review using key risk indicators (KRIs) -- Cybersecurity incident and crisis management -- Business continuity management and cybersecurity -- External context and supply chain -- Internal organization context -- Culture and human factors -- Legal and compliance -- Assurance and cyber risk management -- Information asset management for cyber -- Physical security -- Cybersecurity for operations and communications -- Access control -- Cybersecurity systems: acquisition, development, and maintenance -- People risk management in the digital age -- Cyber competencies and the cybersecurity officer -- Human resources security -- Epilogue. 
520 |a "The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world situations, and cross-functional solutions for enterprise-wide improvement. Beginning with an overview of counter-cyber evolution, the discussion quickly turns practical with design and implementation guidance for the range of capabilities expected of a robust cyber risk management system that is integrated with the enterprise risk management (ERM) system. Expert contributors from around the globe weigh in on specialized topics with tools and techniques to help any type or size of organization create a robust system tailored to its needs. Chapter summaries of required capabilities are aggregated to provide a new cyber risk maturity model used to benchmark capabilities and to road-map gap-improvement. Cyber risk is a fast-growing enterprise risk, not just an IT risk. Yet seldom is guidance provided as to what this means. This book is the first to tackle in detail those enterprise-wide capabilities expected by Board, CEO and Internal Audit, of the diverse executive management functions that need to team up with the Information Security function in order to provide integrated solutions."--Publisher's description. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer crimes. 
650 0 |a Business enterprises  |x Computer networks  |x Security measures. 
650 0 |a Cyberspace  |x Security measures. 
650 0 |a Business  |x Data processing  |x Security measures. 
650 0 |a Risk management. 
650 2 |a Risk Management 
650 6 |a Criminalité informatique. 
650 6 |a Gestion  |x Informatique  |x Sécurité  |x Mesures. 
650 6 |a Gestion du risque. 
650 7 |a risk management.  |2 aat 
650 7 |a COMPUTER SCIENCE  |x General.  |2 bisacsh 
650 7 |a Cyberspace  |x Security measures  |2 fast 
650 7 |a Business  |x Data processing  |x Security measures  |2 fast 
650 7 |a Business enterprises  |x Computer networks  |x Security measures  |2 fast 
650 7 |a Computer crimes  |2 fast 
650 7 |a Risk management  |2 fast 
776 0 8 |i Print version:  |a Antonucci, Domenic.  |t Cyber risk handbook.  |d Hoboken, New Jersey : John Wiley & Sons, [2017]  |z 1119308801  |w (DLC) 2017302691  |w (OCoLC)958097666 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781119308805/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH32064666 
938 |a Askews and Holts Library Services  |b ASKH  |n AH32064667 
938 |a EBL - Ebook Library  |b EBLB  |n EBL4837509 
938 |a EBSCOhost  |b EBSC  |n 1498557 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis36383218 
938 |a Recorded Books, LLC  |b RECE  |n rbeEB00742942 
938 |a YBP Library Services  |b YANK  |n 14241730 
938 |a YBP Library Services  |b YANK  |n 13967605 
938 |a YBP Library Services  |b YANK  |n 13960416 
994 |a 92  |b IZTAP