Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
Cyber Risk Management in Practice: A Guide to Real-World Solutions is your companion in the ever-changing landscape of cybersecurity. Whether you're expanding your knowledge or looking to sharpen your existing skills, this book demystifies the complexities of cyber risk management, offering clear, actionable strategies to enhance your organization's security posture. With a focus on real-world solutions, this guide balances practical application with foundational knowledge. Key Features: Foundational insights: Explore fundamental concepts, frameworks, and required skills that form…mehr
Cyber Risk Management in Practice: A Guide to Real-World Solutions is your companion in the ever-changing landscape of cybersecurity. Whether you're expanding your knowledge or looking to sharpen your existing skills, this book demystifies the complexities of cyber risk management, offering clear, actionable strategies to enhance your organization's security posture. With a focus on real-world solutions, this guide balances practical application with foundational knowledge.
Key Features:
Foundational insights: Explore fundamental concepts, frameworks, and required skills that form the backbone of a strong and pragmatic cyber risk management program tailored to your organization's unique needs. It covers everything from basic principles and threat modeling to developing a security-first culture that drives change within your organization. You'll also learn how to align cybersecurity practices with business objectives to ensure a solid approach to risk management.
Practical application: Follow a hands-on, step-by-step implementation guide through the complete cyber risk management cycle, from business context analysis to developing and implementing effective treatment strategies. This book includes templates, checklists, and practical advice to execute your cyber risk management implementation, making complex processes manageable and straightforward. Real-world scenarios illustrate common pitfalls and effective solutions.
Advanced strategies: Go beyond the basics to achieve cyber resilience. Explore topics like third-party risk management, integrating cybersecurity with business continuity, and managing the risks of emerging technologies like AI and quantum computing. Learn how to build a proactive defense strategy that evolves with emerging threats and keeps your organization secure.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Die Herstellerinformationen sind derzeit nicht verfügbar.
Autorenporträt
Carlos Morales, MBA, A. CCISO, CISM, GRCP, GRCA, CRISC, IRMP, CDPSE, IDPP, IPMP, IAAP, ICEP, is a cybersecurity professional with over 18 years of experience in risk management, privacy, and information security across diverse global landscapes. An advocate for cybersecurity as a business enabler, Carlos is recognized for developing pragmatic, risk-based models that align security initiatives with organizational objectives.
His international expertise is marked by his active participation in initiatives that bridge the gap between the private sector, public institutions, and academia. Carlos has worked with organizations of all sizes around the globe, from multinational conglomerates to startups, bringing a broad, practical perspective across industries. This experience allows him to tailor cybersecurity strategies that are effective and scalable, regardless of organizational size or sector.
He served as an advisor on cybersecurity matters to the Executive Office of the President of Mexico for the National Cybersecurity Plan and was a member of the first Cybersecurity Innovation Council led by the Organization of American States (OAS), where he fostered collaboration among participating countries. At the Instituto Tecnológico y de Estudios Superiores de Monterrey (ITESM), Carlos played an active role in shaping the design of the Cybersecurity HUB and the master's degree in cybersecurity. He continues to share his expertise as a professor in the ITESM Master's program in cybersecurity, guiding the next generation of professionals.
Carlos is also an active participant in international forums, where he shares practical insights and connects with diverse audiences, bridging technical and non-technical perspectives with clarity and impact.
Inhaltsangabe
Introduction Section I. Mastering the essentials of cyber risk management 1. Fundamentals of cyber risk management 2. Cyber risk management frameworks 3. Governance and cybersecurity culture 4. Cyber risk management methodology and risk register 5. Laying the groundwork Section II. Executing cyber risk management in five steps 6. Starting the process: Contexts and information gathering 7. Risk assessment: From identification to characterization 8. Risk treatment strategies 9. Making things happen: Communication and implementation 10. Risk monitoring and metrics Section III. Elevating beyond basics: Achieving cyber resilience 11. Third- party risk management 12. Building cyber resilience 13. Advancing toward risk quantification 14. New technologies: Methods tools and challenges Section IV. Conclusion 15. Bringing it all together
Introduction Section I. Mastering the essentials of cyber risk management 1. Fundamentals of cyber risk management 2. Cyber risk management frameworks 3. Governance and cybersecurity culture 4. Cyber risk management methodology and risk register 5. Laying the groundwork Section II. Executing cyber risk management in five steps 6. Starting the process: Contexts and information gathering 7. Risk assessment: From identification to characterization 8. Risk treatment strategies 9. Making things happen: Communication and implementation 10. Risk monitoring and metrics Section III. Elevating beyond basics: Achieving cyber resilience 11. Third- party risk management 12. Building cyber resilience 13. Advancing toward risk quantification 14. New technologies: Methods tools and challenges Section IV. Conclusion 15. Bringing it all together
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826