UM Logo

The cyber risk handbook : creating and measuring effective cybersecurity capabilities / Domenic Antonucci.

By: Material type: TextTextSeries: Wiley finance seriesPublication details: New Jersey : John Wiley & Sons, Inc., ©2017Description: xxxv, 412 pages : illustrations ; 24 cmISBN:
  • 1119308801
  • 978-1-119-30880-5
Subject(s): DDC classification:
  • DRef 658.478 2017 An88
LOC classification:
  • HD30.38 .A58 2017
Contents:
Introduction -- Board cyber risk oversight -- Principles behind cyber risk management -- Cybersecurity policies and procedures -- Cyber strategic performance management -- Standards and frameworks for cybersecurity -- Identifying, analyzing, and evaluating cyber risks -- Treating cyber risks -- Treating cyber risks using process capabilities -- Treating cyber risks - using insurance and finance -- Monitoring and review using key risk indicators (KRIs) -- Cybersecurity incident and crisis management -- Business continuity management and cybersecurity -- External context and supply chain -- Internal organization context -- Culture and human factors -- Legal and compliance -- Assurance and cyber risk management -- Information asset management for cyber -- Physical security -- Cybersecurity for operations and communications -- Access control -- Cybersecurity systems: acquisition, development, and maintenance -- People risk management in the digital age -- Cyber competencies and the cybersecurity officer --Human resources security -- Epilogue.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Copy number Status Date due Barcode
Reference Reference UM Digos College - LIC Reference DRef 658.478 An88 2017 (Browse shelf(Opens below)) 1 Not for loan 25095

Includes bibliographical references and index.

Introduction -- Board cyber risk oversight -- Principles behind cyber risk management -- Cybersecurity policies and procedures -- Cyber strategic performance management -- Standards and frameworks for cybersecurity -- Identifying, analyzing, and evaluating cyber risks -- Treating cyber risks -- Treating cyber risks using process capabilities -- Treating cyber risks - using insurance and finance -- Monitoring and review using key risk indicators (KRIs) -- Cybersecurity incident and crisis management -- Business continuity management and cybersecurity -- External context and supply chain -- Internal organization context -- Culture and human factors -- Legal and compliance -- Assurance and cyber risk management -- Information asset management for cyber -- Physical security -- Cybersecurity for operations and communications -- Access control -- Cybersecurity systems: acquisition, development, and maintenance -- People risk management in the digital age -- Cyber competencies and the cybersecurity officer --Human resources security -- Epilogue.

There are no comments on this title.

to post a comment.