Syndetics cover image
Image from Syndetics

Cybersecurity : a business solution : an executive perspective on managing cyber risk / by Rob Arnold.

By: Material type: TextTextPublisher: Winston-Salem, NC : Threat Sketch, LLC, [2017]Copyright date: ©2017Description: 94 pages : illustrations ; 23 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9780692944158
  • 069294415X
Subject(s):
Contents:
Why cybersecurity matters for you -- Cyber attacks in the real world -- The business of cybersecurity -- Strategic cyber risk management -- A word about compliance -- Compliance versus exposure -- Cyber risk management -- The basics of measuring risk -- Strategic and tactical planning -- Objectives and milestones -- Objectives and risk assessments -- Setting objectives -- Strategic cyber risk assessments -- Prevention and preparedness -- Balancing prevention and preparedness -- Prevention -- Preparedness -- Regulatory pressures on prevention and preparedness -- Shaping a strategic plan -- Tactical risk management -- Engage the tactical team -- Tactical assessments -- Inventory -- the tactical footprint -- Emerging systems and technologies -- Regulatory and legal exposure -- Assessing tactical impact -- Assessing tactical vulnerability -- Sharing the results -- Budget planning -- Budget allocation -- Budget sizing -- Implementation and beyond -- Implementation -- Managing cybersecurity over time -- Controlling cost -- Identifying opportunities -- Conclusion.
Holdings
Item type Home library Collection Call number Materials specified Status Date due Barcode Item holds
Adult Book Adult Book Main Library NonFiction 005.8 A758 Available 33111010958250
Total holds: 0

Enhanced descriptions from Syndetics:

As a business leader, you might think you have cybersecurity under control because you have a great IT team. But managing cyber risk requires more than firewalls and good passwords. Cash flow, insurance, relationships, and legal affairs for an organization all play major roles in managing cyber risk. Treating cybersecurity as "just an IT problem" leaves an organization exposed and unprepared. Therefore, executives must take charge of the big picture.

Cybersecurity: A Business Solution is a concise guide to managing cybersecurity from a business perspective, written specifically for the leaders of small and medium businesses. In this book you will find a step-by-step approach to managing the financial impact of cybersecurity. The strategy provides the knowledge you need to steer technical experts toward solutions that fit your organization's business mission. The book also covers common pitfalls that lead to a false sense of security. And, to help offset the cost of higher security, it explains how you can leverage investments in cybersecurity to capture market share and realize more profits.

The book's companion material also includes an executive guide to The National Institute of Standards and Technology (NIST) Cybersecurity Framework. It offers a business level overview of the following key terms and concepts, which are central to managing its adoption.

Tiers Profiles Functions Informative References

Why cybersecurity matters for you -- Cyber attacks in the real world -- The business of cybersecurity -- Strategic cyber risk management -- A word about compliance -- Compliance versus exposure -- Cyber risk management -- The basics of measuring risk -- Strategic and tactical planning -- Objectives and milestones -- Objectives and risk assessments -- Setting objectives -- Strategic cyber risk assessments -- Prevention and preparedness -- Balancing prevention and preparedness -- Prevention -- Preparedness -- Regulatory pressures on prevention and preparedness -- Shaping a strategic plan -- Tactical risk management -- Engage the tactical team -- Tactical assessments -- Inventory -- the tactical footprint -- Emerging systems and technologies -- Regulatory and legal exposure -- Assessing tactical impact -- Assessing tactical vulnerability -- Sharing the results -- Budget planning -- Budget allocation -- Budget sizing -- Implementation and beyond -- Implementation -- Managing cybersecurity over time -- Controlling cost -- Identifying opportunities -- Conclusion.

Powered by Koha