|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1255595309 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
210609s2021 nju o 000 0 eng d |
040 |
|
|
|a YDX
|b eng
|e rda
|e pn
|c YDX
|d UKAHL
|d YDXIT
|d OCLCO
|d OCLCF
|d N$T
|d UKMGB
|d RDF
|d OCLCQ
|d OCLCO
|d IEEEE
|d OCLCQ
|
015 |
|
|
|a GBC1F6432
|2 bnb
|
016 |
7 |
|
|a 020227970
|2 Uk
|
019 |
|
|
|a 1256693542
|a 1281933895
|a 1283793682
|
020 |
|
|
|a 9781119809906
|q (electronic book)
|
020 |
|
|
|a 1119809908
|q (electronic book)
|
020 |
|
|
|a 9781119809562
|q (electronic bk.)
|
020 |
|
|
|a 1119809568
|q (electronic bk.)
|
020 |
|
|
|a 9781394176854
|q (electronic bk.)
|
020 |
|
|
|a 1394176856
|q (electronic bk.)
|
020 |
|
|
|z 111980955X
|
020 |
|
|
|z 9781119809555
|
024 |
7 |
|
|a 10.1002/9781394176854
|2 doi
|
029 |
1 |
|
|a UKMGB
|b 020227970
|
029 |
1 |
|
|a AU@
|b 000069912183
|
035 |
|
|
|a (OCoLC)1255595309
|z (OCoLC)1256693542
|z (OCoLC)1281933895
|z (OCoLC)1283793682
|
037 |
|
|
|a 9781119809562
|b Wiley
|
037 |
|
|
|a 9946654
|b IEEE
|
050 |
|
4 |
|a QA76.9.A25
|b R37 2021
|
072 |
|
7 |
|a BUS
|x 033070
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Rasner, Gregory C.
|
245 |
1 |
0 |
|a Cybersecurity and Third-Party Risk :
|b Third Party Threat Hunting /
|c Gregory C. Rasner.
|
264 |
|
1 |
|a Hoboken, New Jersey :
|b Wiley,
|c [2021]
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Online resource; title from digital title page (viewed on July 30, 2021).
|
520 |
|
|
|a STRENGTHEN THE WEAKEST LINKS IN YOUR CYBERSECURITY CHAIN. Across the world, the networks of hundreds of different world-class organizations have been breached in a seemingly never-ending stream of attacks that targeted the trusted vendors of major brands. From Target to Equifax, Home Depot, and GM, it seems as if no company is safe from a third-party incident or breach, regardless of size. And the advanced threats are now exploiting the intersection of weaknesses in cybersecurity and third-party risk management. In Cybersecurity and Third-Party Risk, veteran cybersecurity specialist Gregory Rasner walks readers through how to lock down the vulnerabilities posed to an organization's network by third parties. You'll discover how to move beyond a simple checklist and create an active, effective, and continuous system of third-party cybersecurity risk mitigation. The author discusses how to conduct due diligence on the third parties connected to your company's networks and how to keep your information about them current and reliable. You'll learn about the language you need to look for in a third-party data contract whether you're offshoring or outsourcing data security arrangements. Perfect for professionals and executives responsible for securing their organizations' systems against external threats, Cybersecurity and Third-Party Risk is an indispensable resource for all business leaders who seek to: Understand the fundamentals of third-party risk management Conduct robust intake and ongoing due diligence Perform on-site due diligence and close vendor risks Secure your software supply chain Utilize cloud and on-premises software securely Continuously monitor your third-party vendors and prevent breaches.
|
505 |
0 |
|
|a Foreword -- Introduction -- Section 1 Cybersecurity Third Party Risk -- Chapter 1 What is the risk? -- Chapter 2 Cybersecurity basics -- Chapter 3 What the COVID-19 Pandemic did to Cybersecurity and Third-Party Risk -- Chapter 4 Third-Party Risk Management -- Chapter 5 Onboarding due diligence -- Chapter 6 Ongoing due diligence -- Chapter 7 On-site due diligence -- Chapter 8 Continuous monitoring -- Chapter 9 Offboarding -- Section 2 Next Steps -- Chapter 10 Securing the Cloud -- Chapter 11 Cybersecurity and legal protections -- Chapter 12 Software due diligence -- Chapter 13 Network due diligence -- Chapter 14 Offshore third-party cybersecurity risk -- Chapter 15 Transform to predictive -- Chapter 16 Conclusion -- Index.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
776 |
0 |
8 |
|i Print version:
|z 111980955X
|z 9781119809555
|w (OCoLC)1237397733
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781119809555/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH38857843
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH38791124
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2943709
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 302263936
|
994 |
|
|
|a 92
|b IZTAP
|