Stepping Through Cybersecurity Risk Management cover art

Stepping Through Cybersecurity Risk Management

A Systems Thinking Approach

Preview
Try Premium Plus free
Pick 1 audiobook a month from our unmatched collection - including bestsellers and new releases.
Listen all you want to thousands of included audiobooks, Originals, celeb exclusives, and podcasts.
Access exclusive sales and deals.
£8.99/month after 30 days. Renews automatically.

Stepping Through Cybersecurity Risk Management

By: Jennifer L. Bayuk
Narrated by: Nick Mondelli
Try Premium Plus free

£8.99/month after 30 days. Renews automatically. See here for eligibility.

Buy Now for £12.99

Buy Now for £12.99

About this listen

Stepping Through Cybersecurity Risk Management covers the professional practice of cybersecurity from the perspective of enterprise governance and risk management. It describes the state of the art in cybersecurity risk identification, classification, measurement, remediation, monitoring and reporting. It includes industry standard techniques for examining cybersecurity threat actors, cybersecurity attacks in the context of cybersecurity-related events, technology controls, cybersecurity measures and metrics, cybersecurity issue tracking and analysis, and risk and control assessments.

The book provides precise definitions for information relevant to cybersecurity management decisions and recommendations for collecting and consolidating that information in the service of enterprise risk management. The objective is to enable the listener to recognize, understand, and apply risk-relevant information to the analysis, evaluation, and mitigation of cybersecurity risk. A well-rounded resource, Stepping Through Cybersecurity Risk Management describes both reports and studies that improve cybersecurity decision support.

Composed of ten chapters, the author provides learning objectives, exercises and quiz questions per chapter in an appendix, with quiz answers and exercise grading criteria available to professors.

PLEASE NOTE: When you purchase this title, the accompanying PDF will be available in your Audible Library along with the audio.

©2024 John Wiley & Sons, Inc. (P)2024 Ascent Audio
Security & Encryption Hacking Cybersecurity Risk Management Technology Software Development Computer Security
No reviews yet