How to measure anything in cybersecurity risk:
"A ground shaking exposé on the failure of popular cyber risk management methods How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current "risk management" practices, and offers a series of improvement techniques that help you fill the holes and ramp up secur...
Gespeichert in:
Beteiligte Personen: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Hoboken, New Jersey
John Wiley & Sons
[2016]
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781119085294/?ar |
Zusammenfassung: | "A ground shaking exposé on the failure of popular cyber risk management methods How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current "risk management" practices, and offers a series of improvement techniques that help you fill the holes and ramp up security. In his bestselling book How to Measure Anything, author Douglas W. Hubbard opened the business world's eyes to the critical need for better measurement. This book expands upon that premise and draws from The Failure of Risk Management to sound the alarm in the cybersecurity realm. Some of the field's premier risk management approaches actually create more risk than they mitigate, and questionable methods have been duplicated across industries and embedded in the products accepted as gospel. This book sheds light on these blatant risks, and provides alternate techniques that can help improve your current situation. You'll also learn which approaches are too risky to save, and are actually more damaging than a total lack of any security. Dangerous risk management methods abound; there is no industry more critically in need of solutions than cybersecurity. This book provides solutions where they exist, and advises when to change tracks entirely. Discover the shortcomings of cybersecurity's "best practices" Learn which risk management approaches actually create risk Improve your current practices with practical alterations Learn which methods are beyond saving, and worse than doing nothing Insightful and enlightening, this book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection, so finding cracks in the vault is a positive thingas long as you get there before the bad guys do. How to Measure Anything in Cybersecurity Risk is your guide to more robust protection through better quantitative processes, approaches, and techniques"-- "This book will critique some of cybersecurity's premier, seemingly quantitative, risk management approaches"-- |
Beschreibung: | Includes bibliographical references and index. - Online resource; title from title page (viewed September 6, 2016) |
Umfang: | 1 Online-Ressource (1 volume) illustrations |
ISBN: | 9781119224617 1119224616 1119085292 9781119085294 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047551100 | ||
003 | DE-627-1 | ||
005 | 20240228120143.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2016 xx |||||o 00| ||eng c | ||
020 | |a 9781119224617 |9 978-1-119-22461-7 | ||
020 | |a 1119224616 |9 1-119-22461-6 | ||
020 | |a 1119085292 |9 1-119-08529-2 | ||
020 | |a 9781119085294 |9 978-1-119-08529-4 | ||
020 | |a 9781119085294 |9 978-1-119-08529-4 | ||
035 | |a (DE-627-1)047551100 | ||
035 | |a (DE-599)KEP047551100 | ||
035 | |a (ORHE)9781119085294 | ||
035 | |a (DE-627-1)047551100 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 658.4/78 |2 23 | |
100 | 1 | |a Hubbard, Douglas W. |d 1962- |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a How to measure anything in cybersecurity risk |c Douglas W. Hubbard, Richard Seiersen |
264 | 1 | |a Hoboken, New Jersey |b John Wiley & Sons |c [2016] | |
264 | 4 | |c ©2016 | |
300 | |a 1 Online-Ressource (1 volume) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Online resource; title from title page (viewed September 6, 2016) | ||
520 | |a "A ground shaking exposé on the failure of popular cyber risk management methods How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current "risk management" practices, and offers a series of improvement techniques that help you fill the holes and ramp up security. In his bestselling book How to Measure Anything, author Douglas W. Hubbard opened the business world's eyes to the critical need for better measurement. This book expands upon that premise and draws from The Failure of Risk Management to sound the alarm in the cybersecurity realm. Some of the field's premier risk management approaches actually create more risk than they mitigate, and questionable methods have been duplicated across industries and embedded in the products accepted as gospel. This book sheds light on these blatant risks, and provides alternate techniques that can help improve your current situation. You'll also learn which approaches are too risky to save, and are actually more damaging than a total lack of any security. Dangerous risk management methods abound; there is no industry more critically in need of solutions than cybersecurity. This book provides solutions where they exist, and advises when to change tracks entirely. Discover the shortcomings of cybersecurity's "best practices" Learn which risk management approaches actually create risk Improve your current practices with practical alterations Learn which methods are beyond saving, and worse than doing nothing Insightful and enlightening, this book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection, so finding cracks in the vault is a positive thingas long as you get there before the bad guys do. How to Measure Anything in Cybersecurity Risk is your guide to more robust protection through better quantitative processes, approaches, and techniques"-- | ||
520 | |a "This book will critique some of cybersecurity's premier, seemingly quantitative, risk management approaches"-- | ||
650 | 0 | |a Cyberterrorism | |
650 | 0 | |a Cyberspace |x Security measures | |
650 | 0 | |a Risk management | |
650 | 2 | |a Risk Management | |
650 | 4 | |a Cyberterrorisme | |
650 | 4 | |a Gestion du risque | |
650 | 4 | |a risk management | |
650 | 4 | |a BUSINESS & ECONOMICS ; Statistics | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a Cyberspace ; Security measures | |
650 | 4 | |a Cyberterrorism | |
650 | 4 | |a Risk management | |
700 | 1 | |a Seiersen, Richard |d 1967- |e VerfasserIn |4 aut | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781119085294/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047551100 |
---|---|
_version_ | 1821494883514318848 |
adam_text | |
any_adam_object | |
author | Hubbard, Douglas W. 1962- Seiersen, Richard 1967- |
author_facet | Hubbard, Douglas W. 1962- Seiersen, Richard 1967- |
author_role | aut aut |
author_sort | Hubbard, Douglas W. 1962- |
author_variant | d w h dw dwh r s rs |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047551100 (DE-599)KEP047551100 (ORHE)9781119085294 |
dewey-full | 658.4/78 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/78 |
dewey-search | 658.4/78 |
dewey-sort | 3658.4 278 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03997cam a22005652 4500</leader><controlfield tag="001">ZDB-30-ORH-047551100</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120143.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2016 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119224617</subfield><subfield code="9">978-1-119-22461-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119224616</subfield><subfield code="9">1-119-22461-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119085292</subfield><subfield code="9">1-119-08529-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119085294</subfield><subfield code="9">978-1-119-08529-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119085294</subfield><subfield code="9">978-1-119-08529-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047551100</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047551100</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781119085294</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047551100</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/78</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hubbard, Douglas W.</subfield><subfield code="d">1962-</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">How to measure anything in cybersecurity risk</subfield><subfield code="c">Douglas W. Hubbard, Richard Seiersen</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, New Jersey</subfield><subfield code="b">John Wiley & Sons</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Online resource; title from title page (viewed September 6, 2016)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"A ground shaking exposé on the failure of popular cyber risk management methods How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current "risk management" practices, and offers a series of improvement techniques that help you fill the holes and ramp up security. In his bestselling book How to Measure Anything, author Douglas W. Hubbard opened the business world's eyes to the critical need for better measurement. This book expands upon that premise and draws from The Failure of Risk Management to sound the alarm in the cybersecurity realm. Some of the field's premier risk management approaches actually create more risk than they mitigate, and questionable methods have been duplicated across industries and embedded in the products accepted as gospel. This book sheds light on these blatant risks, and provides alternate techniques that can help improve your current situation. You'll also learn which approaches are too risky to save, and are actually more damaging than a total lack of any security. Dangerous risk management methods abound; there is no industry more critically in need of solutions than cybersecurity. This book provides solutions where they exist, and advises when to change tracks entirely. Discover the shortcomings of cybersecurity's "best practices" Learn which risk management approaches actually create risk Improve your current practices with practical alterations Learn which methods are beyond saving, and worse than doing nothing Insightful and enlightening, this book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection, so finding cracks in the vault is a positive thingas long as you get there before the bad guys do. How to Measure Anything in Cybersecurity Risk is your guide to more robust protection through better quantitative processes, approaches, and techniques"--</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book will critique some of cybersecurity's premier, seemingly quantitative, risk management approaches"--</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberspace</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Risk management</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Risk Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorisme</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Gestion du risque</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">risk management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">BUSINESS & ECONOMICS ; Statistics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Risk management</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Seiersen, Richard</subfield><subfield code="d">1967-</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781119085294/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047551100 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:21:27Z |
institution | BVB |
isbn | 9781119224617 1119224616 1119085292 9781119085294 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 volume) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | John Wiley & Sons |
record_format | marc |
spelling | Hubbard, Douglas W. 1962- VerfasserIn aut How to measure anything in cybersecurity risk Douglas W. Hubbard, Richard Seiersen Hoboken, New Jersey John Wiley & Sons [2016] ©2016 1 Online-Ressource (1 volume) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Online resource; title from title page (viewed September 6, 2016) "A ground shaking exposé on the failure of popular cyber risk management methods How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current "risk management" practices, and offers a series of improvement techniques that help you fill the holes and ramp up security. In his bestselling book How to Measure Anything, author Douglas W. Hubbard opened the business world's eyes to the critical need for better measurement. This book expands upon that premise and draws from The Failure of Risk Management to sound the alarm in the cybersecurity realm. Some of the field's premier risk management approaches actually create more risk than they mitigate, and questionable methods have been duplicated across industries and embedded in the products accepted as gospel. This book sheds light on these blatant risks, and provides alternate techniques that can help improve your current situation. You'll also learn which approaches are too risky to save, and are actually more damaging than a total lack of any security. Dangerous risk management methods abound; there is no industry more critically in need of solutions than cybersecurity. This book provides solutions where they exist, and advises when to change tracks entirely. Discover the shortcomings of cybersecurity's "best practices" Learn which risk management approaches actually create risk Improve your current practices with practical alterations Learn which methods are beyond saving, and worse than doing nothing Insightful and enlightening, this book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection, so finding cracks in the vault is a positive thingas long as you get there before the bad guys do. How to Measure Anything in Cybersecurity Risk is your guide to more robust protection through better quantitative processes, approaches, and techniques"-- "This book will critique some of cybersecurity's premier, seemingly quantitative, risk management approaches"-- Cyberterrorism Cyberspace Security measures Risk management Risk Management Cyberterrorisme Gestion du risque risk management BUSINESS & ECONOMICS ; Statistics COMPUTERS ; Security ; General Cyberspace ; Security measures Seiersen, Richard 1967- VerfasserIn aut |
spellingShingle | Hubbard, Douglas W. 1962- Seiersen, Richard 1967- How to measure anything in cybersecurity risk Cyberterrorism Cyberspace Security measures Risk management Risk Management Cyberterrorisme Gestion du risque risk management BUSINESS & ECONOMICS ; Statistics COMPUTERS ; Security ; General Cyberspace ; Security measures |
title | How to measure anything in cybersecurity risk |
title_auth | How to measure anything in cybersecurity risk |
title_exact_search | How to measure anything in cybersecurity risk |
title_full | How to measure anything in cybersecurity risk Douglas W. Hubbard, Richard Seiersen |
title_fullStr | How to measure anything in cybersecurity risk Douglas W. Hubbard, Richard Seiersen |
title_full_unstemmed | How to measure anything in cybersecurity risk Douglas W. Hubbard, Richard Seiersen |
title_short | How to measure anything in cybersecurity risk |
title_sort | how to measure anything in cybersecurity risk |
topic | Cyberterrorism Cyberspace Security measures Risk management Risk Management Cyberterrorisme Gestion du risque risk management BUSINESS & ECONOMICS ; Statistics COMPUTERS ; Security ; General Cyberspace ; Security measures |
topic_facet | Cyberterrorism Cyberspace Security measures Risk management Risk Management Cyberterrorisme Gestion du risque risk management BUSINESS & ECONOMICS ; Statistics COMPUTERS ; Security ; General Cyberspace ; Security measures |
work_keys_str_mv | AT hubbarddouglasw howtomeasureanythingincybersecurityrisk AT seiersenrichard howtomeasureanythingincybersecurityrisk |