How to measure anything in cybersecurity risk:
A ground shaking exposé on the failure of popular cyber risk management methods How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current "risk management" practices, and offers a series of improvement techniques that help you fill the holes and ramp up security. I...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hoboken, New Jersey
Wiley
[2016]
|
Schlagworte: | |
Online-Zugang: | FRO01 UBG01 UBY01 URL des Erstveröffentlichers |
Zusammenfassung: | A ground shaking exposé on the failure of popular cyber risk management methods How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current "risk management" practices, and offers a series of improvement techniques that help you fill the holes and ramp up security. In his bestselling book How to Measure Anything, author Douglas W. Hubbard opened the business world's eyes to the critical need for better measurement. This book expands upon that premise and draws from The Failure of Risk Management to sound the alarm in the cybersecurity realm. Some of the field's premier risk management approaches actually create more risk than they mitigate, and questionable methods have been duplicated across industries and embedded in the products accepted as gospel. This book sheds light on these blatant risks, and provides alternate techniques that can help improve your current situation. You'll also learn which approaches are too risky to save, and are actually more damaging than a total lack of any security.€ Dangerous risk management methods abound; there is no industry more critically in need of solutions than cybersecurity. This book provides solutions where they exist, and advises when to change tracks entirely. Discover the shortcomings of cybersecurity's "best practices" Learn which risk management approaches actually create risk Improve your current practices with practical alterations Learn which methods are beyond saving, and worse than doing nothing Insightful and enlightening, this book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection, so finding cracks in the vault is a positive thing—as long as you get there before the bad guys do. How to Measure Anything in Cybersecurity Risk is your guide to more robust protection through better quantitative processes, approaches, and techniques"-- |
Beschreibung: | Includes index |
Beschreibung: | 1 online resource (304 pages) |
ISBN: | 1119162319 1119224608 1119224616 9781119162315 9781119224600 9781119224617 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043838491 | ||
003 | DE-604 | ||
005 | 20210310 | ||
007 | cr|uuu---uuuuu | ||
008 | 161021s2016 |||| o||u| ||||||eng d | ||
020 | |a 1119162319 |9 1-119-16231-9 | ||
020 | |a 1119224608 |9 1-119-22460-8 | ||
020 | |a 1119224616 |9 1-119-22461-6 | ||
020 | |a 9781119162315 |9 978-1-119-16231-5 | ||
020 | |a 9781119224600 |c Online |9 978-1-119-22460-0 | ||
020 | |a 9781119224617 |9 978-1-119-22461-7 | ||
035 | |a (ZDB-35-WIC)ocn953458699 | ||
035 | |a (OCoLC)965125991 | ||
035 | |a (DE-599)BVBBV043838491 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-861 |a DE-706 | ||
082 | 0 | |a 658.4/78 | |
100 | 1 | |a Hubbard, Douglas W. |d 1962- |4 aut | |
245 | 1 | 0 | |a How to measure anything in cybersecurity risk |c Douglas W. Hubbard, Richard Seiersen |
264 | 1 | |a Hoboken, New Jersey |b Wiley |c [2016] | |
300 | |a 1 online resource (304 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
520 | |a A ground shaking exposé on the failure of popular cyber risk management methods How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current "risk management" practices, and offers a series of improvement techniques that help you fill the holes and ramp up security. In his bestselling book How to Measure Anything, author Douglas W. Hubbard opened the business world's eyes to the critical need for better measurement. This book expands upon that premise and draws from The Failure of Risk Management to sound the alarm in the cybersecurity realm. Some of the field's premier risk management approaches actually create more risk than they mitigate, and questionable methods have been duplicated across industries and embedded in the products accepted as gospel. This book sheds light on these blatant risks, and provides alternate techniques that can help improve your current situation. You'll also learn which approaches are too risky to save, and are actually more damaging than a total lack of any security.€ Dangerous risk management methods abound; there is no industry more critically in need of solutions than cybersecurity. This book provides solutions where they exist, and advises when to change tracks entirely. Discover the shortcomings of cybersecurity's "best practices" Learn which risk management approaches actually create risk Improve your current practices with practical alterations Learn which methods are beyond saving, and worse than doing nothing Insightful and enlightening, this book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection, so finding cracks in the vault is a positive thing—as long as you get there before the bad guys do. How to Measure Anything in Cybersecurity Risk is your guide to more robust protection through better quantitative processes, approaches, and techniques"-- | ||
650 | 7 | |a BUSINESS & ECONOMICS / Statistics |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 4 | |a Statistik | |
650 | 4 | |a Wirtschaft | |
650 | 4 | |a Cyberterrorism | |
650 | 4 | |a Cyberspace / Security measures | |
650 | 4 | |a Risk management | |
650 | 0 | 7 | |a Risikomanagement |0 (DE-588)4121590-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheit |0 (DE-588)4054790-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Quantitative Methode |0 (DE-588)4232139-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Cyberspace |0 (DE-588)4266146-8 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Cyberspace |0 (DE-588)4266146-8 |D s |
689 | 0 | 1 | |a Sicherheit |0 (DE-588)4054790-5 |D s |
689 | 0 | 2 | |a Risikomanagement |0 (DE-588)4121590-4 |D s |
689 | 0 | 3 | |a Quantitative Methode |0 (DE-588)4232139-6 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Seiersen, Richard |d 1967- |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-1-119-08529-4 |
856 | 4 | 0 | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119162315 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-35-WIC | ||
940 | 1 | |q UBG_PDA_WIC | |
999 | |a oai:aleph.bib-bvb.de:BVB01-029249081 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119162315 |l FRO01 |p ZDB-35-WIC |q FRO_PDA_WIC |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119162315 |l UBG01 |p ZDB-35-WIC |q UBG_PDA_WIC |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119162315 |l UBY01 |p ZDB-35-WIC |q UBY_PDA_WIC_Kauf |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804176706281406464 |
---|---|
any_adam_object | |
author | Hubbard, Douglas W. 1962- Seiersen, Richard 1967- |
author_facet | Hubbard, Douglas W. 1962- Seiersen, Richard 1967- |
author_role | aut aut |
author_sort | Hubbard, Douglas W. 1962- |
author_variant | d w h dw dwh r s rs |
building | Verbundindex |
bvnumber | BV043838491 |
collection | ZDB-35-WIC |
ctrlnum | (ZDB-35-WIC)ocn953458699 (OCoLC)965125991 (DE-599)BVBBV043838491 |
dewey-full | 658.4/78 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/78 |
dewey-search | 658.4/78 |
dewey-sort | 3658.4 278 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04625nmm a2200661zc 4500</leader><controlfield tag="001">BV043838491</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20210310 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">161021s2016 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119162319</subfield><subfield code="9">1-119-16231-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119224608</subfield><subfield code="9">1-119-22460-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119224616</subfield><subfield code="9">1-119-22461-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119162315</subfield><subfield code="9">978-1-119-16231-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119224600</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-119-22460-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119224617</subfield><subfield code="9">978-1-119-22461-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-35-WIC)ocn953458699</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)965125991</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043838491</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-861</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/78</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hubbard, Douglas W.</subfield><subfield code="d">1962-</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">How to measure anything in cybersecurity risk</subfield><subfield code="c">Douglas W. Hubbard, Richard Seiersen</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, New Jersey</subfield><subfield code="b">Wiley</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (304 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">A ground shaking exposé on the failure of popular cyber risk management methods How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current "risk management" practices, and offers a series of improvement techniques that help you fill the holes and ramp up security. In his bestselling book How to Measure Anything, author Douglas W. Hubbard opened the business world's eyes to the critical need for better measurement. This book expands upon that premise and draws from The Failure of Risk Management to sound the alarm in the cybersecurity realm. Some of the field's premier risk management approaches actually create more risk than they mitigate, and questionable methods have been duplicated across industries and embedded in the products accepted as gospel. This book sheds light on these blatant risks, and provides alternate techniques that can help improve your current situation. You'll also learn which approaches are too risky to save, and are actually more damaging than a total lack of any security.€ Dangerous risk management methods abound; there is no industry more critically in need of solutions than cybersecurity. This book provides solutions where they exist, and advises when to change tracks entirely. Discover the shortcomings of cybersecurity's "best practices" Learn which risk management approaches actually create risk Improve your current practices with practical alterations Learn which methods are beyond saving, and worse than doing nothing Insightful and enlightening, this book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection, so finding cracks in the vault is a positive thing&mdash;as long as you get there before the bad guys do. How to Measure Anything in Cybersecurity Risk is your guide to more robust protection through better quantitative processes, approaches, and techniques"--</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Statistics</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Statistik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wirtschaft</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Risk management</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Risikomanagement</subfield><subfield code="0">(DE-588)4121590-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Quantitative Methode</subfield><subfield code="0">(DE-588)4232139-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyberspace</subfield><subfield code="0">(DE-588)4266146-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Cyberspace</subfield><subfield code="0">(DE-588)4266146-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Risikomanagement</subfield><subfield code="0">(DE-588)4121590-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Quantitative Methode</subfield><subfield code="0">(DE-588)4232139-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Seiersen, Richard</subfield><subfield code="d">1967-</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-1-119-08529-4</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119162315</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-35-WIC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">UBG_PDA_WIC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029249081</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119162315</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FRO_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119162315</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">UBG_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119162315</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">UBY_PDA_WIC_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043838491 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:36:26Z |
institution | BVB |
isbn | 1119162319 1119224608 1119224616 9781119162315 9781119224600 9781119224617 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029249081 |
oclc_num | 953458699 965125991 |
open_access_boolean | |
owner | DE-861 DE-706 |
owner_facet | DE-861 DE-706 |
physical | 1 online resource (304 pages) |
psigel | ZDB-35-WIC UBG_PDA_WIC ZDB-35-WIC FRO_PDA_WIC ZDB-35-WIC UBG_PDA_WIC ZDB-35-WIC UBY_PDA_WIC_Kauf |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Wiley |
record_format | marc |
spelling | Hubbard, Douglas W. 1962- aut How to measure anything in cybersecurity risk Douglas W. Hubbard, Richard Seiersen Hoboken, New Jersey Wiley [2016] 1 online resource (304 pages) txt rdacontent c rdamedia cr rdacarrier Includes index A ground shaking exposé on the failure of popular cyber risk management methods How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current "risk management" practices, and offers a series of improvement techniques that help you fill the holes and ramp up security. In his bestselling book How to Measure Anything, author Douglas W. Hubbard opened the business world's eyes to the critical need for better measurement. This book expands upon that premise and draws from The Failure of Risk Management to sound the alarm in the cybersecurity realm. Some of the field's premier risk management approaches actually create more risk than they mitigate, and questionable methods have been duplicated across industries and embedded in the products accepted as gospel. This book sheds light on these blatant risks, and provides alternate techniques that can help improve your current situation. You'll also learn which approaches are too risky to save, and are actually more damaging than a total lack of any security.€ Dangerous risk management methods abound; there is no industry more critically in need of solutions than cybersecurity. This book provides solutions where they exist, and advises when to change tracks entirely. Discover the shortcomings of cybersecurity's "best practices" Learn which risk management approaches actually create risk Improve your current practices with practical alterations Learn which methods are beyond saving, and worse than doing nothing Insightful and enlightening, this book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection, so finding cracks in the vault is a positive thing—as long as you get there before the bad guys do. How to Measure Anything in Cybersecurity Risk is your guide to more robust protection through better quantitative processes, approaches, and techniques"-- BUSINESS & ECONOMICS / Statistics bisacsh COMPUTERS / Security / General bisacsh Statistik Wirtschaft Cyberterrorism Cyberspace / Security measures Risk management Risikomanagement (DE-588)4121590-4 gnd rswk-swf Sicherheit (DE-588)4054790-5 gnd rswk-swf Quantitative Methode (DE-588)4232139-6 gnd rswk-swf Cyberspace (DE-588)4266146-8 gnd rswk-swf Cyberspace (DE-588)4266146-8 s Sicherheit (DE-588)4054790-5 s Risikomanagement (DE-588)4121590-4 s Quantitative Methode (DE-588)4232139-6 s 1\p DE-604 Seiersen, Richard 1967- aut Erscheint auch als Druckausgabe 978-1-119-08529-4 https://onlinelibrary.wiley.com/doi/book/10.1002/9781119162315 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Hubbard, Douglas W. 1962- Seiersen, Richard 1967- How to measure anything in cybersecurity risk BUSINESS & ECONOMICS / Statistics bisacsh COMPUTERS / Security / General bisacsh Statistik Wirtschaft Cyberterrorism Cyberspace / Security measures Risk management Risikomanagement (DE-588)4121590-4 gnd Sicherheit (DE-588)4054790-5 gnd Quantitative Methode (DE-588)4232139-6 gnd Cyberspace (DE-588)4266146-8 gnd |
subject_GND | (DE-588)4121590-4 (DE-588)4054790-5 (DE-588)4232139-6 (DE-588)4266146-8 |
title | How to measure anything in cybersecurity risk |
title_auth | How to measure anything in cybersecurity risk |
title_exact_search | How to measure anything in cybersecurity risk |
title_full | How to measure anything in cybersecurity risk Douglas W. Hubbard, Richard Seiersen |
title_fullStr | How to measure anything in cybersecurity risk Douglas W. Hubbard, Richard Seiersen |
title_full_unstemmed | How to measure anything in cybersecurity risk Douglas W. Hubbard, Richard Seiersen |
title_short | How to measure anything in cybersecurity risk |
title_sort | how to measure anything in cybersecurity risk |
topic | BUSINESS & ECONOMICS / Statistics bisacsh COMPUTERS / Security / General bisacsh Statistik Wirtschaft Cyberterrorism Cyberspace / Security measures Risk management Risikomanagement (DE-588)4121590-4 gnd Sicherheit (DE-588)4054790-5 gnd Quantitative Methode (DE-588)4232139-6 gnd Cyberspace (DE-588)4266146-8 gnd |
topic_facet | BUSINESS & ECONOMICS / Statistics COMPUTERS / Security / General Statistik Wirtschaft Cyberterrorism Cyberspace / Security measures Risk management Risikomanagement Sicherheit Quantitative Methode Cyberspace |
url | https://onlinelibrary.wiley.com/doi/book/10.1002/9781119162315 |
work_keys_str_mv | AT hubbarddouglasw howtomeasureanythingincybersecurityrisk AT seiersenrichard howtomeasureanythingincybersecurityrisk |