Enterprise Cybersecurity in Digital Business

Enterprise Cybersecurity in Digital Business

Building a Cyber Resilient Organization

Evans, Ariel

Taylor & Francis Ltd

03/2022

530

Dura

Inglês

9780367511470

15 a 20 dias

453

Descrição não disponível.
Part I: The Evolution of Cybersecurity. 1. Cyber - A business Issue 2. 'Cyber Risk' 3. 'The History of Cybersecurity' 4. 'Cyber Consequences' 5. 'Cyber Trends and Spending' 6. 'Cyber Roles' Part II: Cybersecurity Basics. 7. 'Cyber -Attack Surfaces and Digital Asset Inventories' 8. 'Cyber Terminology and Statistics' 9. 'Enterprise Threats of Today and Cybercriminals' 10. 'Cybersecurity Regulations, Standards and Frameworks' 11. 'Enterprise Cybersecurity Programs' 12. 'Organizational Cyber Maturities' Part III: Cybersecurity Tools. 13. 'Cyber Policies' 14. 'Cybersecurity Tools Part IV: Cybersecurity Regulation.
15. 'U.S. Federal Regulations' 16. 'U.S. State Regulations' 17. 'New York State Department of Financial Services Part 500' 18. 'Global, Industry or Other Types of Cybersecurity Regulations' Part V: Incident Response, Forensics and Audit. 19. 'Incident Response Plans' 20. 'Forensic Methods' 21. 'IT Audit'
Part VI: Cybersecurity Risk Management. 22. 'Cybersecurity Financial Exposures' 23. 'Digital Asset Cyber Risk Modeling and Scoring' 24. 'Mitigating Cybersecurity Scores and Residual Cyber Risk Scores'
Part VII: GDPR and Privacy. 25. 'GDPR Overview' 26. 'GDPR Articles' 27. 'GDRP Evidence' 28. 'GDPR Privacy Impact Assessment (PIA)' Part VIII: Cybersecurity Risk Management Strategy. 29. 'CISO Strategies' 30. 'Cyber in the Board Room' Part IX: Cybersecurity Insurance. 31. 'Cyber Insurance Overview' 32. 'Calculating Limits Adequacy' 33. 'Ransomware Strategies' Part X: Introduction to Cybersecurity Vendor Risk Management. 34. 'Vendor Risk Overview' 35. 'Vendor Cybersecurity Regulations'
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Cybersecurity;Cyber risk;Risk management;Information management;Data Breach;GDPR;Cyber Risk Management;Cyber Insurance;Data Exfiltration;Covered Entity;Ransomware Attack;CISO;Cloud Service Providers;Cybersecurity Control;Business Processes;Antivirus Software;IoT Device;Cyber Event;Cybersecurity Program;NIST Cybersecurity Framework;GDPR Article;Cardholder Data;Pia;Business Interruption;Data Subject;Cloud Service;DFS;CIO