The cyber risk handbook : creating and measuring effective cybersecurity capabilities /

Saved in:
Bibliographic Details
Main Author: Antonucci, Domenic
Format: Online
Language:English
Published: Hoboken, New Jersey : John Wiley and Sons, Inc., 2017
Series:Wiley finance series
Subjects:
Online Access:Bloomberg Law
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000cam a2200000Ii 4500
001 ocn981912077
003 OCoLC
005 20180713094430.0
006 m o d
008 170407s2017 nyu ob 001 0 eng d
020 |a 9781119308959 
020 |a 111930895X 
020 |a 9781119309741 
020 |a 1119309743 
020 |a 9781119309727 
020 |a 1119309727 
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d N$T  |d YDX  |d EBLCP  |d DG1  |d IDEBK  |d UMI  |d CNCGM  |d STF  |d TOH  |d COO  |d OTZ  |d OCLCQ  |d VT2  |d OCLCO  |d DEBSZ  |d UCO  |d OCLCQ  |d OCLCO  |d MERUC  |d OCLCF 
049 |a BNAM 
100 1 |a Antonucci, Domenic, 
245 1 4 |a The cyber risk handbook :  |b creating and measuring effective cybersecurity capabilities /  |c Domenic Antonucci 
260 |a Hoboken, New Jersey :  |b John Wiley and Sons, Inc.,  |c 2017 
300 |a 1 online resource 
490 1 |a Wiley Finance 
504 |a Includes bibliographical references and index 
505 0 |a Introduction -- Board cyber risk oversight -- Principles behind cyber risk management -- Cybersecurity policies and procedures -- Cyber strategic performance management -- Standards and frameworks for cybersecurity -- Identifying, analyzing, and evaluating cyber risks -- Treating cyber risks -- Treating cyber risks using process capabilities -- Treating cyber risks -- using insurance and finance -- Monitoring and review using key risk indicators (KRIs) -- Cybersecurity incident and crisis management -- Business continuity management and cybersecurity -- External context and supply chain -- Internal organization context -- Culture and human factors -- Legal and compliance -- Assurance and cyber risk management -- Information asset management for cyber -- Physical security -- Cybersecurity for operations and communications -- Access control -- Cybersecurity systems: acquisition, development, and maintenance -- People risk management in the digital age -- Cyber competencies and the cybersecurity officer -- Human resources security -- Epilogue 
588 0 |a Vendor-supplied metadata 
650 0 |a Business enterprises  |x Computer networks  |x Security measures 
650 0 |a Business  |x Data processing  |x Security measures 
650 0 |a Cyberspace  |x Security measures 
650 0 |a Risk management 
650 0 |a Computer crimes 
776 0 8 |i Print version:  |a Antonucci, Domenic.  |t Cyber risk handbook.  |d Hoboken, New Jersey : John Wiley & Sons, [2017]  |z 1119308801  |w (DLC) 2017302691  |w (OCoLC)958097666 
830 0 |a Wiley finance series 
856 4 0 |3 Bloomberg Law  |u https://www.bloomberglaw.com/browser/105.525476 
907 |a .b2385326 
998 |a inter 
999 |c 112390 
852 |a Law Library  |b online