Executive’s Guide to Cyber Risk: Securing the Future Today
- Length: 208 pages
- Edition: 1
- Language: English
- Publisher: Wiley
- Publication Date: 2022-08-09
- ISBN-10: 1119863112
- ISBN-13: 9781119863113
- Sales Rank: #3480396 (See Top 100 Books)
This book offers any senior level executive an understanding of the core fundamentals of Cyber Risk, which is critical for any business to remain sustainable and viable in the information age era of disruptive cyber-attacks. For any executive to understand that Cyber Risk is like any other business risk, it needs to be explained in focused non-technical terms. The book provides core foundational precepts of cyber risk that will enable executive leadership to make well-informed decisions along with their senior cyber security executives regarding cyber risk management. In addition, describes the different approaches by executives to cyber risk. There are three types of executive leadership: (1) hindsight, (2) foresight, or (3) none of the two. This book shows how to be a cyber risk leader through foresight while maintaining the corporation’s vision and objectives (proactive vs. reactive).
Cover Table of Contents Title Page Copyright Dedication Foreword Preface THE PURPOSE OF THIS BOOK MY PERSPECTIVE WHAT THIS BOOK IS AND WHAT IT'S NOT HOW THE BOOK IS ORGANIZED Acknowledgments About the Author CHAPTER ONE: Cyber Strategy INTRODUCTION CYBERSECURITY STRATEGY THE VALUE PROPOSITION OF A CYBERSECURITY STRATEGY THE EXECUTIVE'S ROLE IN CYBERSECURITY STRATEGY EXECUTIVE'S GUIDE TO CYBERSECURITY STRATEGY NEXT STEPS/REFLECTION SUMMARY NOTES CHAPTER TWO: Cyber Value INTRODUCTION UNDERSTANDING CYBER VALUE THE VALUE PROPOSITION OF CYBER VAR CASE STUDY: THE COLONIAL PIPELINE CYBER-ATTACK EXECUTIVE'S GUIDE TO CYBER RISK MANAGEMENT EXECUTIVE'S GUIDE TO FAIR CYBER VALUE-AT-RISK NEXT STEPS SUMMARY NOTES CHAPTER THREE: Cyber Compliance INTRODUCTION CYBER COMPLIANCE THE VALUE PROPOSITION OF CYBER COMPLIANCE CASE STUDY EXECUTIVE'S GUIDE TO CYBER COMPLIANCE CYBER COMPLIANCE CLASSIFICATIONS NEXT STEPS AND REFLECTION SUMMARY NOTES CHAPTER FOUR: Cyber Culture INTRODUCTION WHAT IS CULTURE ANYWAY? BUILDING A HUMAN-CENTRIC APPROACH TO RISK MANAGEMENT CASE STUDIES: HUMAN ERROR INCIDENTS EXECUTIVE'S GUIDE TO CREATING A RISK-AWARE CULTURE NEXT STEPS SUMMARY NOTES CHAPTER FIVE: Cyber Resilience INTRODUCTION THE VALUE PROPOSITION OF CYBER RESILIENCE CASE STUDIES THREAT ACTORS? EXECUTIVE'S GUIDE TO CYBER RESILIENCE NEXT STEPS/REFLECTION SUMMARY NOTES Appendix A: Framework for Improving Critical Infrastructure Cybersecurity EXECUTIVE SUMMARY 1.0 FRAMEWORK INTRODUCTION 1.1 OVERVIEW OF THE FRAMEWORK 1.2 RISK MANAGEMENT AND THE CYBERSECURITY FRAMEWORK 2.0 FRAMEWORK BASICS 2.1 1 FRAMEWORK CORE 2.2 2 FRAMEWORK IMPLEMENTATION TIERS 2.3 3 FRAMEWORK PROFILE 2.4 COORDINATION OF FRAMEWORK IMPLEMENTATION 3.0 HOW TO USE THE FRAMEWORK 3.1 BASIC REVIEW OF CYBERSECURITY PRACTICES 3.2 ESTABLISHING OR IMPROVING A CYBERSECURITY PROGRAM NOTES Appendix B: Risk Management: ISO 310001 WHO IS ISO 31000 FOR? WHAT ARE THE BENEFITS FOR MY BUSINESS? WHY WAS IT REVISED? WHAT ARE THE MAIN DIFFERENCES? WHAT ABOUT CERTIFICATION? HOW DO I GET STARTED? ABOUT ISO NOTES Appendix C: Privacy by Design The 7 Foundational Principles Implementation and Mapping of Fair Information Practices1 PURPOSE: SCOPE: CONTEXT: 1. PROACTIVE NOT REACTIVE; PREVENTATIVE NOT REMEDIAL 2. PRIVACY AS THE DEFAULT 3. PRIVACY EMBEDDED INTO DESIGN 4. FULL FUNCTIONALITY – POSITIVE-SUM, NOT ZERO-SUM 5. END-TO-END SECURITY – LIFECYCLE PROTECTION 6. VISIBILITY AND TRANSPARENCY 7. RESPECT FOR USER PRIVACY NOTE Appendix D: KnowBe4 – Free IT Security Tools KNOWBE4—FREE IT SECURITY TOOLS PHISHING TOOLS SECURITY AWARENESS TRAINING TOOLS PASSWORD TOOLS EMAIL SECURITY TOOLS MALWARE TOOLS COMPLIANCE TOOLS Appendix E: Cyber Resilience Framework by NIST1 CHAPTER TWO 2.1 CYBER RESILIENCY ENGINEERING FRAMEWORK 2.2 CYBER RESILIENCY IN THE SYSTEM LIFE CYCLE 2.3 RISK MANAGEMENT AND CYBER RESILIENCY CHAPTER THREE 3.1 SELECTING AND PRIORITIZING CYBER RESILIENCY CONSTRUCTS 3.2 ANALYTIC PRACTICES AND PROCESSES REFERENCES Index End User License Agreement
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.