Confronting cyber risk: an embedded endurance strategy for cybersecurity
Why is cyber risk an issue? -- Who is attacking us? -- How do I assess our cyber risk? -- What do I need to know about cyber frameworks, standards, and laws? -- Who is responsible for cybersecurity? -- What risk prevention measures can I use? -- What risk resilience measures can I use? -- How do I e...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York, NY
Oxford University Press
[2022]
|
Schriftenreihe: | Oxford scholarship online
|
Schlagworte: | |
Online-Zugang: | DE-863 DE-862 DE-739 URL des Erstveröffentlichers |
Zusammenfassung: | Why is cyber risk an issue? -- Who is attacking us? -- How do I assess our cyber risk? -- What do I need to know about cyber frameworks, standards, and laws? -- Who is responsible for cybersecurity? -- What risk prevention measures can I use? -- What risk resilience measures can I use? -- How do I embed cyber risk management in all aspects of the organization? "Confronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity is a practical leadership handbook defining a new strategy for improving cybersecurity and mitigating cyber risk. Written by two leading experts with extensive professional experience in cybersecurity, the book provides CEOs and cyber newcomers alike with novel, concrete guidance on how to implement a cutting-edge strategy to mitigate an organization's overall risk to malicious cyberattacks. Using short, real-world case studies, the book highlights the need to address attack prevention and the resilience of each digital asset while also accounting for an incident's potential impact on overall operations. In a world of hackers, artificial intelligence, and persistent ransomware attacks, the Embedded Endurance strategy embraces the reality of interdependent digital assets and provides an approach that addresses cyber risk at both the micro- (people, networks, systems and data) and macro-(organizational) levels. Most books about cybersecurity focus entirely on technology; the Embedded Endurance strategy recognizes the need for sophisticated thinking with preventative and resilience measures engaged systematically a cross your organization"-- |
Beschreibung: | 1 Online-Ressource |
ISBN: | 9780197526569 |
DOI: | 10.1093/oso/9780197526545.001.0001 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV049388864 | ||
003 | DE-604 | ||
005 | 20240527 | ||
007 | cr|uuu---uuuuu | ||
008 | 231030s2022 xxu|||| o||u| ||||||eng d | ||
020 | |a 9780197526569 |c epub |9 978-0-19-752656-9 | ||
024 | 7 | |a 10.1093/oso/9780197526545.001.0001 |2 doi | |
035 | |a (OCoLC)1409127415 | ||
035 | |a (DE-599)BVBBV049388864 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c XD-US | ||
049 | |a DE-863 |a DE-862 |a DE-739 | ||
082 | 0 | |a 005.8 | |
100 | 1 | |a Falco, Gregory |e Verfasser |0 (DE-588)1257838873 |4 aut | |
245 | 1 | 0 | |a Confronting cyber risk |b an embedded endurance strategy for cybersecurity |c Gregory Falco and Eric Rosenbach |
264 | 1 | |a New York, NY |b Oxford University Press |c [2022] | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Oxford scholarship online | |
520 | 3 | |a Why is cyber risk an issue? -- Who is attacking us? -- How do I assess our cyber risk? -- What do I need to know about cyber frameworks, standards, and laws? -- Who is responsible for cybersecurity? -- What risk prevention measures can I use? -- What risk resilience measures can I use? -- How do I embed cyber risk management in all aspects of the organization? | |
520 | 3 | |a "Confronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity is a practical leadership handbook defining a new strategy for improving cybersecurity and mitigating cyber risk. Written by two leading experts with extensive professional experience in cybersecurity, the book provides CEOs and cyber newcomers alike with novel, concrete guidance on how to implement a cutting-edge strategy to mitigate an organization's overall risk to malicious cyberattacks. Using short, real-world case studies, the book highlights the need to address attack prevention and the resilience of each digital asset while also accounting for an incident's potential impact on overall operations. In a world of hackers, artificial intelligence, and persistent ransomware attacks, the Embedded Endurance strategy embraces the reality of interdependent digital assets and provides an approach that addresses cyber risk at both the micro- (people, networks, systems and data) and macro-(organizational) levels. Most books about cybersecurity focus entirely on technology; the Embedded Endurance strategy recognizes the need for sophisticated thinking with preventative and resilience measures engaged systematically a cross your organization"-- | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Risikomanagement |0 (DE-588)4121590-4 |2 gnd |9 rswk-swf |
653 | 0 | |a Computer security | |
653 | 0 | |a Computer networks / Security measures | |
653 | 0 | |a Internet / Security measures | |
653 | 0 | |a Risk management | |
653 | 0 | |a Computer networks ; Security measures | |
653 | 0 | |a Computer security | |
653 | 0 | |a Internet ; Security measures | |
653 | 0 | |a Risk management | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Risikomanagement |0 (DE-588)4121590-4 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Rosenbach, Eric B. |e Verfasser |0 (DE-588)1023073137 |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Hardcover |z 978-0-19-752657-6 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 9780197526545 |
856 | 4 | 0 | |u https://dx.doi.org/10.1093/oso/9780197526545.001.0001 |x Resolving-System |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-28-OSA |a ZDB-28-OSD | ||
966 | e | |u https://academic.oup.com/book/41146 |l DE-863 |p ZDB-28-OSA |x Verlag |3 Volltext | |
966 | e | |u https://academic.oup.com/book/41146 |l DE-862 |p ZDB-28-OSA |x Verlag |3 Volltext | |
966 | e | |u https://dx.doi.org/10.1093/oso/9780197526545.001.0001 |l DE-739 |p ZDB-28-OSD |q UPA_PDA_OSD_Kauf2023 |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 1056435 |
---|---|
_version_ | 1824553952712065024 |
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Falco, Gregory Rosenbach, Eric B. |
author_GND | (DE-588)1257838873 (DE-588)1023073137 |
author_facet | Falco, Gregory Rosenbach, Eric B. |
author_role | aut aut |
author_sort | Falco, Gregory |
author_variant | g f gf e b r eb ebr |
building | Verbundindex |
bvnumber | BV049388864 |
collection | ZDB-28-OSA ZDB-28-OSD |
ctrlnum | (OCoLC)1409127415 (DE-599)BVBBV049388864 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.1093/oso/9780197526545.001.0001 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000 c 4500</leader><controlfield tag="001">BV049388864</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240527</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">231030s2022 xxu|||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780197526569</subfield><subfield code="c">epub</subfield><subfield code="9">978-0-19-752656-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1093/oso/9780197526545.001.0001</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1409127415</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049388864</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">XD-US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Falco, Gregory</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1257838873</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Confronting cyber risk</subfield><subfield code="b">an embedded endurance strategy for cybersecurity</subfield><subfield code="c">Gregory Falco and Eric Rosenbach</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Oxford University Press</subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Oxford scholarship online</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Why is cyber risk an issue? -- Who is attacking us? -- How do I assess our cyber risk? -- What do I need to know about cyber frameworks, standards, and laws? -- Who is responsible for cybersecurity? -- What risk prevention measures can I use? -- What risk resilience measures can I use? -- How do I embed cyber risk management in all aspects of the organization?</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"Confronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity is a practical leadership handbook defining a new strategy for improving cybersecurity and mitigating cyber risk. Written by two leading experts with extensive professional experience in cybersecurity, the book provides CEOs and cyber newcomers alike with novel, concrete guidance on how to implement a cutting-edge strategy to mitigate an organization's overall risk to malicious cyberattacks. Using short, real-world case studies, the book highlights the need to address attack prevention and the resilience of each digital asset while also accounting for an incident's potential impact on overall operations. In a world of hackers, artificial intelligence, and persistent ransomware attacks, the Embedded Endurance strategy embraces the reality of interdependent digital assets and provides an approach that addresses cyber risk at both the micro- (people, networks, systems and data) and macro-(organizational) levels. Most books about cybersecurity focus entirely on technology; the Embedded Endurance strategy recognizes the need for sophisticated thinking with preventative and resilience measures engaged systematically a cross your organization"--</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Risikomanagement</subfield><subfield code="0">(DE-588)4121590-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Internet / Security measures</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Risk management</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Internet ; Security measures</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Risk management</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Risikomanagement</subfield><subfield code="0">(DE-588)4121590-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rosenbach, Eric B.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1023073137</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">978-0-19-752657-6</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">9780197526545</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://dx.doi.org/10.1093/oso/9780197526545.001.0001</subfield><subfield code="x">Resolving-System</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-28-OSA</subfield><subfield code="a">ZDB-28-OSD</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://academic.oup.com/book/41146</subfield><subfield code="l">DE-863</subfield><subfield code="p">ZDB-28-OSA</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://academic.oup.com/book/41146</subfield><subfield code="l">DE-862</subfield><subfield code="p">ZDB-28-OSA</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://dx.doi.org/10.1093/oso/9780197526545.001.0001</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-28-OSD</subfield><subfield code="q">UPA_PDA_OSD_Kauf2023</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV049388864 |
illustrated | Not Illustrated |
index_date | 2024-07-03T23:00:43Z |
indexdate | 2025-02-20T06:44:03Z |
institution | BVB |
isbn | 9780197526569 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034716330 |
oclc_num | 1409127415 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-739 |
owner_facet | DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-739 |
physical | 1 Online-Ressource |
psigel | ZDB-28-OSA ZDB-28-OSD ZDB-28-OSD UPA_PDA_OSD_Kauf2023 |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | Oxford University Press |
record_format | marc |
series2 | Oxford scholarship online |
spellingShingle | Falco, Gregory Rosenbach, Eric B. Confronting cyber risk an embedded endurance strategy for cybersecurity Computersicherheit (DE-588)4274324-2 gnd Risikomanagement (DE-588)4121590-4 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4121590-4 |
title | Confronting cyber risk an embedded endurance strategy for cybersecurity |
title_auth | Confronting cyber risk an embedded endurance strategy for cybersecurity |
title_exact_search | Confronting cyber risk an embedded endurance strategy for cybersecurity |
title_exact_search_txtP | Confronting cyber risk an embedded endurance strategy for cybersecurity |
title_full | Confronting cyber risk an embedded endurance strategy for cybersecurity Gregory Falco and Eric Rosenbach |
title_fullStr | Confronting cyber risk an embedded endurance strategy for cybersecurity Gregory Falco and Eric Rosenbach |
title_full_unstemmed | Confronting cyber risk an embedded endurance strategy for cybersecurity Gregory Falco and Eric Rosenbach |
title_short | Confronting cyber risk |
title_sort | confronting cyber risk an embedded endurance strategy for cybersecurity |
title_sub | an embedded endurance strategy for cybersecurity |
topic | Computersicherheit (DE-588)4274324-2 gnd Risikomanagement (DE-588)4121590-4 gnd |
topic_facet | Computersicherheit Risikomanagement |
url | https://dx.doi.org/10.1093/oso/9780197526545.001.0001 |
work_keys_str_mv | AT falcogregory confrontingcyberriskanembeddedendurancestrategyforcybersecurity AT rosenbachericb confrontingcyberriskanembeddedendurancestrategyforcybersecurity |