Confronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity
- Length: 224 pages
- Edition: 1
- Language: English
- Publisher: Oxford University Press
- Publication Date: 2021-11-30
- ISBN-10: 0197526543
- ISBN-13: 9780197526545
- Sales Rank: #1250298 (See Top 100 Books)
An adaptive cyber risk management guide from MIT scientist and Johns Hopkins professor Gregory Falco and “Cyber Czar” Eric Rosenbach
Cyberattacks continue to grow in number, intensity, and sophistication. While attackers persistently adapt, business leaders have suffered from employing the same cyber risk management strategies for decades. Organizations must learn how to move past temporary solutions and invest in long-term
resiliency measures to thrive in the future cyber economy.
Confronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity is a practical leadership guidebook outlining a new strategy for improving organizational cybersecurity and mitigating cyber risk. Veteran cybersecurity experts Falco and Rosenbach introduce the Embedded Endurance strategy as a
systems-level approach to cyber risk management which addresses interdependent components of organizational risk and prepares organizations for the inevitability of cyber threats over the long-term. Using real world examples from SolarWinds to the Colonial Pipeline attack, the authors extend beyond
hardware and software to provide a thoughtful ten-step process for organizations to address the simultaneous operational, reputational, and litigation risks common to cyberattacks. They conclude with helpful “cryptograms” from the future, in which business leaders are confronted with the next
generation of cyber risk challenges.
Clear and informative, Confronting Cyber Risk provides CEOs and cyber newcomers alike with concrete guidance on how to implement a cutting-edge strategy to mitigate an organization’s overall risk to malicious cyberattacks in an evolving cyber risk landscape.
Cover Title Page Copyright Page Dedication Contents Preface 1. Why Is Cyber Risk an Issue? 2. Who Is Attacking Us? 3. How Do I Assess Our Cyber Risk? 4. What Do I Need to Know About Cyber Frameworks, Standards, and Laws? 5. Who Is Responsible for Cybersecurity? 6. What Risk Prevention Measures Can I Use? 7. What Risk Resilience Measures Can I Use? 8. How Do I Embed Cyber Risk Management in All Aspects of the Organization? Conclusion Notes
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.