LEADER 03331nam 2200505 450 001 9910816307203321 005 20200520144314.0 010 $a1-119-49092-8 010 $a1-119-49091-X 035 $a(CKB)4100000007265245 035 $a(Au-PeEL)EBL5614240 035 $a(OCoLC)1080082434 035 $a(CaSebORM)9781119490937 035 $a(MiAaPQ)EBC5614240 035 $a(EXLCZ)994100000007265245 100 $a20190117d2019 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSolving cyber risk $eprotecting your company and society /$fAndrew Coburn, Eireann Leverett, Gordon Woo 205 $a1st edition 210 1$aHoboken, New Jersey :$cWiley,$d2019. 215 $a1 online resource (384 pages) 225 1 $aWiley finance series 311 $a1-119-49093-6 320 $aIncludes bibliographical references and index. 330 $aThe non-technical handbook for cyber security risk management Solving Cyber Risk distills a decade of research into a practical framework for cyber security. Blending statistical data and cost information with research into the culture, psychology, and business models of the hacker community, this book provides business executives, policy-makers, and individuals with a deeper understanding of existing future threats, and an action plan for safeguarding their organizations. Key Risk Indicators reveal vulnerabilities based on organization type, IT infrastructure and existing security measures, while expert discussion from leading cyber risk specialists details practical, real-world methods of risk reduction and mitigation. By the nature of the business, your organization?s customer database is packed with highly sensitive information that is essentially hacker-bait, and even a minor flaw in security protocol could spell disaster. This book takes you deep into the cyber threat landscape to show you how to keep your data secure. Understand who is carrying out cyber-attacks, and why Identify your organization?s risk of attack and vulnerability to damage Learn the most cost-effective risk reduction measures Adopt a new cyber risk assessment and quantification framework based on techniques used by the insurance industry By applying risk management principles to cyber security, non-technical leadership gains a greater understanding of the types of threat, level of threat, and level of investment needed to fortify the organization against attack. Just because you have not been hit does not mean your data is safe, and hackers rely on their targets? complacence to help maximize their haul. Solving Cyber Risk gives you a concrete action plan for implementing top-notch preventative measures before you?re forced to implement damage control. 410 0$aWiley finance series. 606 $aComputer security 606 $aData protection 615 0$aComputer security. 615 0$aData protection. 676 $a005.8 700 $aCoburn$b Andrew$g(Andrew W.),$0554051 702 $aLeverett$b Eireann$f1975- 702 $aWoo$b G. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910816307203321 996 $aSolving cyber risk$94007291 997 $aUNINA