Is your enterprise’s strategy for cybersecurity just crossing its fingers and hoping nothing bad ever happens? If so…you’re not alone. Getting cybersecurity right is all too often an afterthought for Fortune 500 firms, bolted on and hopefully creating a secure environment. We all know this approach doesn’t work, but what should a smart enterprise do to stay safe?
Today, cybersecurity is no longer just a tech issue. In reality, it never was. It’s a management issue, a leadership issue, a strategy issue: It’s a “must have right”…a survival issue. Business leaders and IT managers alike need a new paradigm to work together and succeed.
After years of distinguished work as a corporate executive, board member, author, consultant, and expert witness in the field of risk management and cybersecurity, David X Martin is THE pioneering thought leader in the new field of CyRMSM. Martin has created an entirely new paradigm that approaches security as a business problem and aligns it with business needs. He is the go-to guy on this vitally important issue. In this new book, Martin shares his experience and expertise to help you navigate today’s dangerous cybersecurity terrain, and take proactive steps to prepare your company―and yourself ―to survive, thrive, and keep your data (and your reputation) secure.
Cover Half Title Title Page Copyright Page Dedication Table of Contents Introduction Chapter 1. The Current Landscape Note PRONG 1: CyRM℠: Cyber Risk Management Chapter 2. Gather Intelligence, Anticipate Risk Chapter 3. Building a More Effective Cybersecurity Defense Sound the Alarm Solve the Problem Recover and Remember Consider Methods to Transfer Cyber Risks Chapter 4. Align Critical Decision-Making for IT vs. Business Recognize the Problem and Address It Take Action Manage the Alignment Chapter 5. Cybersecurity for Senior Executives and Board Members PRONG 2: CyberWellness℠ Chapter 6. CyberWellness℠: A Companywide Approach Incident Response Plans Penetration Testing Tabletop Exercises Public Relations and Legal Counsel Establish Effective Governance Ongoing Workforce Training and Development Implement Management Processes for All Third-Party Vendors and Suppliers Take a Step Back Chapter 7. Cultivate a Strong Culture to Enhance Cybersecurity Data-Centric Security Get the Users Involved Engage Employees in Training Applications Make Diversity Part of the Security Culture PRONG 3: Cybersecurity as a Business Strategy Chapter 8. Trust Will Become a Competitive Advantage Chapter 9. CyRM℠ as a Vital Business Strategy Chapter 10. How to Think About the Future Making Better Decisions Regarding Risk Assessment Rules of the Game Making Your Decision Reevaluate Emerging Threats Use of Scenarios Based on Emerging Threats Applying CyRM℠ Notes Conclusion Appendix A Guiding Principles for Cyber Risk Governance DCRO Cyber Risk Governance Council Co-Chairs Introduction Conclusion The DCRO Guiding Principles for Cyber Risk Governance DCRO Cyber Risk Governance Council Members Appendix B Primer on Cybersecurity for Boards of Directors How Do Directors Cope with their Obligations to Oversee Cybersecurity? Introduction Conclusion Directors’ Cyber Checklist Notes Index
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.