Managing Cybersecurity Risk: Book 3
- Length: 128 pages
- Edition: 1
- Language: English
- Publisher: Legend Business
- Publication Date: 2019-10-01
- ISBN-10: 1789550521
- ISBN-13: 9781789550528
- Sales Rank: #0 (See Top 100 Books)
Cybersecurity is the practice of protecting systems, networks and programs from digital attacks. These attacks are usually aimed at accessing, changing, or destroying sensitive information, extorting money from users, or interrupting normal business processes.
This new edition will provide valuable information on the cyber environment and threats that businesses may encounter. Such is the scale and variety of cyber threats, it is essential to recognize issues such as gaps in the workforce and the skills required to combat them. The guide also addresses the social and financial impacts of cyber breaches and the development of cyber protection for the future.
Offering understanding and advice the book covers topics such as the following, all from key speakers and industry experts:
- Training
- Technology trends
- New theories
- Current approaches
- Tactical risk management
- Stories of human errors and their results
Managing Cybersecurity Risk is an essential read for all businesses, whether large or small.
With a Foreword by Don Randall, former head of Security and CISO, the Bank of England, contributors include Vijay Rathour, Grant Thornton and Digital Forensics Group, Nick Wilding, General Manager of Cyber Resilience at Axelos, IASME Consortium Ltd, CyberCare UK, DLA Piper, CYBERAWARE and more.
Cover Title Copyright Contents List Foreword List of Contributors Introduction Part one: The scale of cyber threats – training is key 1. The Threat from Big States 2. The GDPR and DPA 2018 3. Driving Behaviour Change Through Moments That Truly Matter 4. Cybersecurity and Small Business – Balancing Risk and Reward 5. There’s No Such Thing as a Free Lunch Part Two: Addressing the threats to your business 6. Insider Out – Why Securing Your Business From Insider Threats is Critical for Data Security 7. Insider Threat – Balancing Good Information Security Practices With Data Protection and Employment Laws 8. From Security Awareness Training to Secure Behaviour Change 9. Fixing your Cybersecurity Staff Retention Problem 10. How to Secure, Protect and Build Resilience Part Three: Cultural issues and bottom line impact 11. Trust Issues Can Be Good – How Operating a Zero Trust Posture Can Improve Your Security 12. Culture and The Human Factor – Closing the Security Skills Gap Builds a Bridge to the Future 13. The Importance of Creating the Right Work Culture 14. Reviewing and Updating Business Plans 15. The Cost of a Cyber Incident – The Unexpected Social and Financial Impacts Following a Breach Endpiece From CYBER AWARE Appendix – Contributors’ Contacts
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.