New Books & Bestsellers Autumn 2020 (GBP)

Page 114

Cyber Risk Management

This book

<< Provides guidance on managing

common threats to confidentiality, integrity and availability including malware, data leakage, insider threat and Denial-of-Service

Prioritize Threats, Identify Vulnerabilities and Apply Controls

<< Includes examples and use

Edition 1

Date

03/06/2019

Paperback Ebook Hardback

9780749484125 £39.99 9780749484132 £39.99 9780749498788 £120.00

cases including Yahoo, Facebook and TalkTalk, along with implementation review checklists at the end of each chapter

<< Explores how to prioritize

relevant risks rather than those sensationalized by the media

Pages 416 Dimensions 234x156 Subject Risk Management

Author Information

Description

Christopher J Hodson is Chief Information Security Officer (CISO), EMEA at Tanium. He has 18 years’ experience across the financial, retail, energy and media industry sectors and was previously CISO, EMEA and Data Protection Officer at Zscaler. He holds an MSc in Cyber Security from Royal Holloway and retains an active role in the Infosec industry through directorship of the Institute of Information Security Professionals (IISP) and membership of CompTIA’s Cyber Security Committee.

Most organizations are undergoing a digital transformation of some sort and are looking to embrace innovative technology, but new ways of doing business inevitably lead to new threats which can cause irreparable financial, operational and reputational damage. In an increasingly punitive regulatory climate, organizations are also under pressure to be more accountable and compliant. Cyber Risk Management clearly explains the importance of implementing a cyber security strategy and provides practical guidance for those responsible for managing threat events, vulnerabilities and controls, including malware, data leakage, insider threat and Denial-of-Service. Examples and use cases including Yahoo, Facebook and TalkTalk, add context throughout and emphasize the importance of communicating security and risk effectively, while implementation review checklists bring together key points at the end of each chapter. Cyber Risk Management analyzes the innate human factors around risk and how they affect cyber awareness and employee training, along with the need to assess the risks posed by third parties. Including an introduction to threat modelling, this book presents a datacentric approach to cyber risk management based on business impact assessments, data classification, data flow modelling and assessing return on investment. It covers pressing developments in artificial intelligence, machine learning, big data and cloud mobility, and includes advice on responding to risks which are applicable for the environment and not just based on media sensationalism.

Table of Contents

Related Titles

1 1.1 1.2 1.3 2 2.1 2.2 3 3.1 3.2 3.3 3.4 4

IT Governance 9780749474058 £49.99

Contextualizing cybersecurity risk Why now? The only constant is change Technologies and security challenges Data breaches Cybersecurity programme management What are cybersecurity and cybercrime? Establishing a cybersecurity programme Actors, events and vulnerabilities Threat actors Threat events Vulnerabilities Controls Conclusion – The cybersecurity risk equation explained 4.1 Cyber risk management – A conclusion

114

Risk & Compliance

Fundamentals of Risk Management 9780749483074 £39.99 Data Strategy 9780749479855 £19.99


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.