The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities
The Cyber Risk Handbook is the practitioner's guide to implementing, measuring, and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world situations and cross-functional solutions for enterpris...
Gespeichert in:
Beteilige Person: | |
---|---|
Weitere beteiligte Personen: | |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
[Erscheinungsort nicht ermittelbar]
Ascent Audio
2024
|
Ausgabe: | Unabridged. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781663730794/?ar |
Zusammenfassung: | The Cyber Risk Handbook is the practitioner's guide to implementing, measuring, and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world situations and cross-functional solutions for enterprise-wide improvement. Beginning with an overview of counter-cyber evolution, the discussion quickly turns practical with design and implementation guidance for the range of capabilities expected of a robust cyber risk management system that is integrated with the enterprise risk management (ERM) system. Expert contributors from around the globe weigh in on specialized topics with tools and techniques to help any type or size of organization create a robust system tailored to its needs. Chapter summaries of required capabilities are aggregated to provide a new cyber risk maturity model used to benchmark capabilities and to road-map gap-improvement. Cyber risk is a fast-growing enterprise risk, not just an IT risk. Yet seldom is guidance provided as to what this means. This book is the first to tackle in detail those enterprise-wide capabilities expected by board, CEO, and internal audit, of the diverse executive management functions that need to team up with the information security function in order to provide integrated solutions. |
Beschreibung: | Audio book. - Online resource; title from title details screen (cloudLibrary, viewed November 28, 2024) |
Umfang: | 1 Online-Ressource (1 sound file (11hr., 59min., 56sec.)) |
ISBN: | 9781663730794 1663730792 |
Internformat
MARC
LEADER | 00000nam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-111748410 | ||
003 | DE-627-1 | ||
005 | 20250109140335.0 | ||
007 | cr uuu---uuuuu | ||
008 | 250109s2024 xx |||||o 00| ||eng c | ||
020 | |a 9781663730794 |9 978-1-6637-3079-4 | ||
020 | |a 1663730792 |9 1-6637-3079-2 | ||
035 | |a (DE-627-1)111748410 | ||
035 | |a (DE-599)KEP111748410 | ||
035 | |a (ORHE)9781663730794 | ||
035 | |a (DE-627-1)111748410 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a BUS027020 |2 bisacsh | |
072 | 7 | |a BUS027000 |2 bisacsh | |
072 | 7 | |a BUS000000 |2 bisacsh | |
082 | 0 | |a 005.8 |2 23/eng/20241210 | |
100 | 1 | |a Antonucci, Domenic |e VerfasserIn |4 aut | |
245 | 1 | 4 | |a The Cyber Risk Handbook |b Creating and Measuring Effective Cybersecurity Capabilities |c Domenic Antonucci |
250 | |a Unabridged. | ||
264 | 1 | |a [Erscheinungsort nicht ermittelbar] |b Ascent Audio |c 2024 | |
300 | |a 1 Online-Ressource (1 sound file (11hr., 59min., 56sec.)) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Audio book. - Online resource; title from title details screen (cloudLibrary, viewed November 28, 2024) | ||
520 | |a The Cyber Risk Handbook is the practitioner's guide to implementing, measuring, and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world situations and cross-functional solutions for enterprise-wide improvement. Beginning with an overview of counter-cyber evolution, the discussion quickly turns practical with design and implementation guidance for the range of capabilities expected of a robust cyber risk management system that is integrated with the enterprise risk management (ERM) system. Expert contributors from around the globe weigh in on specialized topics with tools and techniques to help any type or size of organization create a robust system tailored to its needs. Chapter summaries of required capabilities are aggregated to provide a new cyber risk maturity model used to benchmark capabilities and to road-map gap-improvement. Cyber risk is a fast-growing enterprise risk, not just an IT risk. Yet seldom is guidance provided as to what this means. This book is the first to tackle in detail those enterprise-wide capabilities expected by board, CEO, and internal audit, of the diverse executive management functions that need to team up with the information security function in order to provide integrated solutions. | ||
650 | 0 | |a Computer crimes | |
650 | 0 | |a Business enterprises |x Computer networks |x Security measures | |
650 | 0 | |a Cyberspace |x Security measures | |
650 | 0 | |a Business |x Data processing |x Security measures | |
650 | 0 | |a Risk management | |
650 | 4 | |a Criminalité informatique | |
650 | 4 | |a Gestion ; Informatique ; Sécurité ; Mesures | |
650 | 4 | |a Gestion du risque | |
650 | 4 | |a risk management | |
650 | 4 | |a Financial Risk Management | |
650 | 4 | |a Finance | |
650 | 4 | |a BUSINESS & ECONOMICS | |
655 | 4 | |a Audiobooks | |
655 | 4 | |a Livres audio | |
700 | 1 | |a Vertullo, Jon |e ErzählerIn |4 nrt | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781663730794/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-111748410 |
---|---|
_version_ | 1829007829321646080 |
adam_text | |
any_adam_object | |
author | Antonucci, Domenic |
author2 | Vertullo, Jon |
author2_role | nrt |
author2_variant | j v jv |
author_facet | Antonucci, Domenic Vertullo, Jon |
author_role | aut |
author_sort | Antonucci, Domenic |
author_variant | d a da |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)111748410 (DE-599)KEP111748410 (ORHE)9781663730794 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | Unabridged. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03362nam a22005652c 4500</leader><controlfield tag="001">ZDB-30-ORH-111748410</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20250109140335.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">250109s2024 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781663730794</subfield><subfield code="9">978-1-6637-3079-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1663730792</subfield><subfield code="9">1-6637-3079-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)111748410</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP111748410</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781663730794</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)111748410</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS027020</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS027000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS000000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20241210</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Antonucci, Domenic</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The Cyber Risk Handbook</subfield><subfield code="b">Creating and Measuring Effective Cybersecurity Capabilities</subfield><subfield code="c">Domenic Antonucci</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Unabridged.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Erscheinungsort nicht ermittelbar]</subfield><subfield code="b">Ascent Audio</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 sound file (11hr., 59min., 56sec.))</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Audio book. - Online resource; title from title details screen (cloudLibrary, viewed November 28, 2024)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The Cyber Risk Handbook is the practitioner's guide to implementing, measuring, and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world situations and cross-functional solutions for enterprise-wide improvement. Beginning with an overview of counter-cyber evolution, the discussion quickly turns practical with design and implementation guidance for the range of capabilities expected of a robust cyber risk management system that is integrated with the enterprise risk management (ERM) system. Expert contributors from around the globe weigh in on specialized topics with tools and techniques to help any type or size of organization create a robust system tailored to its needs. Chapter summaries of required capabilities are aggregated to provide a new cyber risk maturity model used to benchmark capabilities and to road-map gap-improvement. Cyber risk is a fast-growing enterprise risk, not just an IT risk. Yet seldom is guidance provided as to what this means. This book is the first to tackle in detail those enterprise-wide capabilities expected by board, CEO, and internal audit, of the diverse executive management functions that need to team up with the information security function in order to provide integrated solutions.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberspace</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business</subfield><subfield code="x">Data processing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Risk management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminalité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Gestion ; Informatique ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Gestion du risque</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">risk management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Financial Risk Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Finance</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">BUSINESS & ECONOMICS</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Audiobooks</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Livres audio</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Vertullo, Jon</subfield><subfield code="e">ErzählerIn</subfield><subfield code="4">nrt</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781663730794/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
genre | Audiobooks Livres audio |
genre_facet | Audiobooks Livres audio |
id | ZDB-30-ORH-111748410 |
illustrated | Not Illustrated |
indexdate | 2025-04-10T09:36:31Z |
institution | BVB |
isbn | 9781663730794 1663730792 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 sound file (11hr., 59min., 56sec.)) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | Ascent Audio |
record_format | marc |
spelling | Antonucci, Domenic VerfasserIn aut The Cyber Risk Handbook Creating and Measuring Effective Cybersecurity Capabilities Domenic Antonucci Unabridged. [Erscheinungsort nicht ermittelbar] Ascent Audio 2024 1 Online-Ressource (1 sound file (11hr., 59min., 56sec.)) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Audio book. - Online resource; title from title details screen (cloudLibrary, viewed November 28, 2024) The Cyber Risk Handbook is the practitioner's guide to implementing, measuring, and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world situations and cross-functional solutions for enterprise-wide improvement. Beginning with an overview of counter-cyber evolution, the discussion quickly turns practical with design and implementation guidance for the range of capabilities expected of a robust cyber risk management system that is integrated with the enterprise risk management (ERM) system. Expert contributors from around the globe weigh in on specialized topics with tools and techniques to help any type or size of organization create a robust system tailored to its needs. Chapter summaries of required capabilities are aggregated to provide a new cyber risk maturity model used to benchmark capabilities and to road-map gap-improvement. Cyber risk is a fast-growing enterprise risk, not just an IT risk. Yet seldom is guidance provided as to what this means. This book is the first to tackle in detail those enterprise-wide capabilities expected by board, CEO, and internal audit, of the diverse executive management functions that need to team up with the information security function in order to provide integrated solutions. Computer crimes Business enterprises Computer networks Security measures Cyberspace Security measures Business Data processing Security measures Risk management Criminalité informatique Gestion ; Informatique ; Sécurité ; Mesures Gestion du risque risk management Financial Risk Management Finance BUSINESS & ECONOMICS Audiobooks Livres audio Vertullo, Jon ErzählerIn nrt |
spellingShingle | Antonucci, Domenic The Cyber Risk Handbook Creating and Measuring Effective Cybersecurity Capabilities Computer crimes Business enterprises Computer networks Security measures Cyberspace Security measures Business Data processing Security measures Risk management Criminalité informatique Gestion ; Informatique ; Sécurité ; Mesures Gestion du risque risk management Financial Risk Management Finance BUSINESS & ECONOMICS |
title | The Cyber Risk Handbook Creating and Measuring Effective Cybersecurity Capabilities |
title_auth | The Cyber Risk Handbook Creating and Measuring Effective Cybersecurity Capabilities |
title_exact_search | The Cyber Risk Handbook Creating and Measuring Effective Cybersecurity Capabilities |
title_full | The Cyber Risk Handbook Creating and Measuring Effective Cybersecurity Capabilities Domenic Antonucci |
title_fullStr | The Cyber Risk Handbook Creating and Measuring Effective Cybersecurity Capabilities Domenic Antonucci |
title_full_unstemmed | The Cyber Risk Handbook Creating and Measuring Effective Cybersecurity Capabilities Domenic Antonucci |
title_short | The Cyber Risk Handbook |
title_sort | cyber risk handbook creating and measuring effective cybersecurity capabilities |
title_sub | Creating and Measuring Effective Cybersecurity Capabilities |
topic | Computer crimes Business enterprises Computer networks Security measures Cyberspace Security measures Business Data processing Security measures Risk management Criminalité informatique Gestion ; Informatique ; Sécurité ; Mesures Gestion du risque risk management Financial Risk Management Finance BUSINESS & ECONOMICS |
topic_facet | Computer crimes Business enterprises Computer networks Security measures Cyberspace Security measures Business Data processing Security measures Risk management Criminalité informatique Gestion ; Informatique ; Sécurité ; Mesures Gestion du risque risk management Financial Risk Management Finance BUSINESS & ECONOMICS Audiobooks Livres audio |
work_keys_str_mv | AT antonuccidomenic thecyberriskhandbookcreatingandmeasuringeffectivecybersecuritycapabilities AT vertullojon thecyberriskhandbookcreatingandmeasuringeffectivecybersecuritycapabilities AT antonuccidomenic cyberriskhandbookcreatingandmeasuringeffectivecybersecuritycapabilities AT vertullojon cyberriskhandbookcreatingandmeasuringeffectivecybersecuritycapabilities |