LEADER 05086nam 2200577 450 001 9910270881303321 005 20231117082758.0 010 $a1-119-30972-7 010 $a1-119-30895-X 010 $a1-119-30974-3 035 $a(CKB)4330000000010145 035 $a(Au-PeEL)EBL4837509 035 $a(CaPaEBR)ebr11370993 035 $a(CaONFJC)MIL1005548 035 $a(OCoLC)981912077 035 $a(CaSebORM)9781119308805 035 $a(MiAaPQ)EBC4837509 035 $a(EXLCZ)994330000000010145 100 $a20170426h20172017 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 14$aThe cyber risk handbook $ecreating and measuring effective cybersecurity capabilities /$fDomenic Antonucci 205 $a1st edition 210 1$aHoboken, New Jersey :$cWiley,$d2017. 210 4$dİ2017 215 $a1 online resource (451 pages) 225 1 $aWiley Finance 225 1 $aTHEi Wiley ebooks 300 $aIncludes index. 311 $a1-119-30880-1 320 $aIncludes bibliographical references and index. 327 $aIntroduction -- Board cyber risk oversight -- Principles behind cyber risk management -- Cybersecurity policies and procedures -- Cyber strategic performance management -- Standards and frameworks for cybersecurity -- Identifying, analyzing, and evaluating cyber risks -- Treating cyber risks -- Treating cyber risks using process capabilities -- Treating cyber risks - using insurance and finance -- Monitoring and review using key risk indicators (KRIs) -- Cybersecurity incident and crisis management -- Business continuity management and cybersecurity -- External context and supply chain -- Internal organization context -- Culture and human factors -- Legal and compliance -- Assurance and cyber risk management -- Information asset management for cyber -- Physical security -- Cybersecurity for operations and communications -- Access control -- Cybersecurity systems: acquisition, development, and maintenance -- People risk management in the digital age -- Cyber competencies and the cybersecurity officer --Human resources security -- Epilogue. 330 $aActionable guidance and expert perspective for real-world cybersecurity The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world situations, and cross-functional solutions for enterprise-wide improvement. Beginning with an overview of counter-cyber evolution, the discussion quickly turns practical with design and implementation guidance for the range of capabilities expected of a robust cyber risk management system that is integrated with the enterprise risk management (ERM) system. Expert contributors from around the globe weigh in on specialized topics with tools and techniques to help any type or size of organization create a robust system tailored to its needs. Chapter summaries of required capabilities are aggregated to provide a new cyber risk maturity model used to benchmark capabilities and to road-map gap-improvement. Cyber risk is a fast-growing enterprise risk, not just an IT risk. Yet seldom is guidance provided as to what this means. This book is the first to tackle in detail those enterprise-wide capabilities expected by Board, CEO and Internal Audit, of the diverse executive management functions that need to team up with the Information Security function in order to provide integrated solutions. Learn how cyber risk management can be integrated to better protect your enterprise Design and benchmark new and improved practical counter-cyber capabilities Examine planning and implementation approaches, models, methods, and more Adopt a new cyber risk maturity model tailored to your enterprise needs The need to manage cyber risk across the enterprise?inclusive of the IT operations?is a growing concern as massive data breaches make the news on an alarmingly frequent basis. With a cyber risk management system now a business-necessary requirement, practitioners need to assess the effectiveness of their current system, and measure its gap-improvement over time in response to a dynamic and fast-moving threat landscape. The Cyber Risk Handbook brings the world's best thinking to bear on aligning that system to the enterprise and vice-a-versa. Every functional head of any organization must have a copy at-hand to understand their role in achieving that alignment. 410 0$aWiley finance series. 410 0$aTHEi Wiley ebooks. 606 $aComputer crimes 606 $aCyberspace$xSecurity measures 615 0$aComputer crimes. 615 0$aCyberspace$xSecurity measures. 676 $a364.168 700 $aAntonucci$b Domenic$01028031 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910270881303321 996 $aThe cyber risk handbook$92443842 997 $aUNINA