The cyber risk handbook: creating and measuring effective cybersecurity capabilities
"The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world situations, and cross-functional solutions for ent...
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Hoboken, New Jersey
John Wiley and Sons, Inc.
2017
|
Schriftenreihe: | Wiley finance series
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781119308805/?ar |
Zusammenfassung: | "The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world situations, and cross-functional solutions for enterprise-wide improvement. Beginning with an overview of counter-cyber evolution, the discussion quickly turns practical with design and implementation guidance for the range of capabilities expected of a robust cyber risk management system that is integrated with the enterprise risk management (ERM) system. Expert contributors from around the globe weigh in on specialized topics with tools and techniques to help any type or size of organization create a robust system tailored to its needs. Chapter summaries of required capabilities are aggregated to provide a new cyber risk maturity model used to benchmark capabilities and to road-map gap-improvement. Cyber risk is a fast-growing enterprise risk, not just an IT risk. Yet seldom is guidance provided as to what this means. This book is the first to tackle in detail those enterprise-wide capabilities expected by Board, CEO and Internal Audit, of the diverse executive management functions that need to team up with the Information Security function in order to provide integrated solutions."--Publisher's description. |
Beschreibung: | Includes index. - Includes bibliographical references and index. - Vendor-supplied metadata |
Umfang: | 1 Online-Ressource |
ISBN: | 9781119308959 111930895X 9781119309741 1119309743 9781119309727 1119309727 9781119308805 |
Internformat
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047553707 | ||
003 | DE-627-1 | ||
005 | 20240228120248.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2017 xx |||||o 00| ||eng c | ||
020 | |a 9781119308959 |c electronic bk. |9 978-1-119-30895-9 | ||
020 | |a 111930895X |c electronic bk. |9 1-119-30895-X | ||
020 | |a 9781119309741 |c electronic bk. |9 978-1-119-30974-1 | ||
020 | |a 1119309743 |c electronic bk. |9 1-119-30974-3 | ||
020 | |a 9781119309727 |9 978-1-119-30972-7 | ||
020 | |a 1119309727 |9 1-119-30972-7 | ||
020 | |a 9781119308805 |9 978-1-119-30880-5 | ||
035 | |a (DE-627-1)047553707 | ||
035 | |a (DE-599)KEP047553707 | ||
035 | |a (ORHE)9781119308805 | ||
035 | |a (DE-627-1)047553707 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Antonucci, Domenic |e VerfasserIn |4 aut | |
245 | 1 | 4 | |a The cyber risk handbook |b creating and measuring effective cybersecurity capabilities |c Domenic Antonucci |
264 | 1 | |a Hoboken, New Jersey |b John Wiley and Sons, Inc. |c 2017 | |
264 | 4 | |c ©2017 | |
300 | |a 1 Online-Ressource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a Wiley finance series | |
500 | |a Includes index. - Includes bibliographical references and index. - Vendor-supplied metadata | ||
520 | |a "The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world situations, and cross-functional solutions for enterprise-wide improvement. Beginning with an overview of counter-cyber evolution, the discussion quickly turns practical with design and implementation guidance for the range of capabilities expected of a robust cyber risk management system that is integrated with the enterprise risk management (ERM) system. Expert contributors from around the globe weigh in on specialized topics with tools and techniques to help any type or size of organization create a robust system tailored to its needs. Chapter summaries of required capabilities are aggregated to provide a new cyber risk maturity model used to benchmark capabilities and to road-map gap-improvement. Cyber risk is a fast-growing enterprise risk, not just an IT risk. Yet seldom is guidance provided as to what this means. This book is the first to tackle in detail those enterprise-wide capabilities expected by Board, CEO and Internal Audit, of the diverse executive management functions that need to team up with the Information Security function in order to provide integrated solutions."--Publisher's description. | ||
650 | 0 | |a Computer crimes | |
650 | 0 | |a Business enterprises |x Computer networks |x Security measures | |
650 | 0 | |a Cyberspace |x Security measures | |
650 | 0 | |a Business |x Data processing |x Security measures | |
650 | 0 | |a Risk management | |
650 | 2 | |a Risk Management | |
650 | 4 | |a Criminalité informatique | |
650 | 4 | |a Gestion ; Informatique ; Sécurité ; Mesures | |
650 | 4 | |a Gestion du risque | |
650 | 4 | |a risk management | |
650 | 4 | |a COMPUTER SCIENCE ; General | |
650 | 4 | |a Cyberspace ; Security measures | |
650 | 4 | |a Business ; Data processing ; Security measures | |
650 | 4 | |a Business enterprises ; Computer networks ; Security measures | |
650 | 4 | |a Computer crimes | |
650 | 4 | |a Risk management | |
776 | 1 | |z 1119308801 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1119308801 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781119308805/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047553707 |
---|---|
_version_ | 1829007791745925120 |
adam_text | |
any_adam_object | |
author | Antonucci, Domenic |
author_facet | Antonucci, Domenic |
author_role | aut |
author_sort | Antonucci, Domenic |
author_variant | d a da |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047553707 (DE-599)KEP047553707 (ORHE)9781119308805 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03807cam a22006612c 4500</leader><controlfield tag="001">ZDB-30-ORH-047553707</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120248.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2017 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119308959</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-119-30895-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">111930895X</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-119-30895-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119309741</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-119-30974-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119309743</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-119-30974-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119309727</subfield><subfield code="9">978-1-119-30972-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119309727</subfield><subfield code="9">1-119-30972-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119308805</subfield><subfield code="9">978-1-119-30880-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047553707</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047553707</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781119308805</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047553707</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Antonucci, Domenic</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The cyber risk handbook</subfield><subfield code="b">creating and measuring effective cybersecurity capabilities</subfield><subfield code="c">Domenic Antonucci</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, New Jersey</subfield><subfield code="b">John Wiley and Sons, Inc.</subfield><subfield code="c">2017</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Wiley finance series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - Includes bibliographical references and index. - Vendor-supplied metadata</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world situations, and cross-functional solutions for enterprise-wide improvement. Beginning with an overview of counter-cyber evolution, the discussion quickly turns practical with design and implementation guidance for the range of capabilities expected of a robust cyber risk management system that is integrated with the enterprise risk management (ERM) system. Expert contributors from around the globe weigh in on specialized topics with tools and techniques to help any type or size of organization create a robust system tailored to its needs. Chapter summaries of required capabilities are aggregated to provide a new cyber risk maturity model used to benchmark capabilities and to road-map gap-improvement. Cyber risk is a fast-growing enterprise risk, not just an IT risk. Yet seldom is guidance provided as to what this means. This book is the first to tackle in detail those enterprise-wide capabilities expected by Board, CEO and Internal Audit, of the diverse executive management functions that need to team up with the Information Security function in order to provide integrated solutions."--Publisher's description.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberspace</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business</subfield><subfield code="x">Data processing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Risk management</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Risk Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminalité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Gestion ; Informatique ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Gestion du risque</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">risk management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTER SCIENCE ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business ; Data processing ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises ; Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Risk management</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">1119308801</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1119308801</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781119308805/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047553707 |
illustrated | Not Illustrated |
indexdate | 2025-04-10T09:35:54Z |
institution | BVB |
isbn | 9781119308959 111930895X 9781119309741 1119309743 9781119309727 1119309727 9781119308805 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | John Wiley and Sons, Inc. |
record_format | marc |
series2 | Wiley finance series |
spelling | Antonucci, Domenic VerfasserIn aut The cyber risk handbook creating and measuring effective cybersecurity capabilities Domenic Antonucci Hoboken, New Jersey John Wiley and Sons, Inc. 2017 ©2017 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Wiley finance series Includes index. - Includes bibliographical references and index. - Vendor-supplied metadata "The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world situations, and cross-functional solutions for enterprise-wide improvement. Beginning with an overview of counter-cyber evolution, the discussion quickly turns practical with design and implementation guidance for the range of capabilities expected of a robust cyber risk management system that is integrated with the enterprise risk management (ERM) system. Expert contributors from around the globe weigh in on specialized topics with tools and techniques to help any type or size of organization create a robust system tailored to its needs. Chapter summaries of required capabilities are aggregated to provide a new cyber risk maturity model used to benchmark capabilities and to road-map gap-improvement. Cyber risk is a fast-growing enterprise risk, not just an IT risk. Yet seldom is guidance provided as to what this means. This book is the first to tackle in detail those enterprise-wide capabilities expected by Board, CEO and Internal Audit, of the diverse executive management functions that need to team up with the Information Security function in order to provide integrated solutions."--Publisher's description. Computer crimes Business enterprises Computer networks Security measures Cyberspace Security measures Business Data processing Security measures Risk management Risk Management Criminalité informatique Gestion ; Informatique ; Sécurité ; Mesures Gestion du risque risk management COMPUTER SCIENCE ; General Cyberspace ; Security measures Business ; Data processing ; Security measures Business enterprises ; Computer networks ; Security measures 1119308801 Erscheint auch als Druck-Ausgabe 1119308801 |
spellingShingle | Antonucci, Domenic The cyber risk handbook creating and measuring effective cybersecurity capabilities Computer crimes Business enterprises Computer networks Security measures Cyberspace Security measures Business Data processing Security measures Risk management Risk Management Criminalité informatique Gestion ; Informatique ; Sécurité ; Mesures Gestion du risque risk management COMPUTER SCIENCE ; General Cyberspace ; Security measures Business ; Data processing ; Security measures Business enterprises ; Computer networks ; Security measures |
title | The cyber risk handbook creating and measuring effective cybersecurity capabilities |
title_auth | The cyber risk handbook creating and measuring effective cybersecurity capabilities |
title_exact_search | The cyber risk handbook creating and measuring effective cybersecurity capabilities |
title_full | The cyber risk handbook creating and measuring effective cybersecurity capabilities Domenic Antonucci |
title_fullStr | The cyber risk handbook creating and measuring effective cybersecurity capabilities Domenic Antonucci |
title_full_unstemmed | The cyber risk handbook creating and measuring effective cybersecurity capabilities Domenic Antonucci |
title_short | The cyber risk handbook |
title_sort | cyber risk handbook creating and measuring effective cybersecurity capabilities |
title_sub | creating and measuring effective cybersecurity capabilities |
topic | Computer crimes Business enterprises Computer networks Security measures Cyberspace Security measures Business Data processing Security measures Risk management Risk Management Criminalité informatique Gestion ; Informatique ; Sécurité ; Mesures Gestion du risque risk management COMPUTER SCIENCE ; General Cyberspace ; Security measures Business ; Data processing ; Security measures Business enterprises ; Computer networks ; Security measures |
topic_facet | Computer crimes Business enterprises Computer networks Security measures Cyberspace Security measures Business Data processing Security measures Risk management Risk Management Criminalité informatique Gestion ; Informatique ; Sécurité ; Mesures Gestion du risque risk management COMPUTER SCIENCE ; General Cyberspace ; Security measures Business ; Data processing ; Security measures Business enterprises ; Computer networks ; Security measures |
work_keys_str_mv | AT antonuccidomenic thecyberriskhandbookcreatingandmeasuringeffectivecybersecuritycapabilities AT antonuccidomenic cyberriskhandbookcreatingandmeasuringeffectivecybersecuritycapabilities |