Details

Stepping Through Cybersecurity Risk Management


Stepping Through Cybersecurity Risk Management

A Systems Thinking Approach
1. Aufl.

von: Jennifer L. Bayuk

82,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 13.03.2024
ISBN/EAN: 9781394213962
Sprache: englisch
Anzahl Seiten: 336

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<b>Stepping Through Cybersecurity Risk Management</b> <p><b>Authoritative resource delivering the professional practice of cybersecurity from the perspective of enterprise governance and risk management.</b></p> <p><i>Stepping Through Cybersecurity Risk Management </i>covers the professional practice of cybersecurity from the perspective of enterprise governance and risk management. It describes the state of the art in cybersecurity risk identification, classification, measurement, remediation, monitoring and reporting. It includes industry standard techniques for examining cybersecurity threat actors, cybersecurity attacks in the context of cybersecurity-related events, technology controls, cybersecurity measures and metrics, cybersecurity issue tracking and analysis, and risk and control assessments.</p> <p>The text provides precise definitions for information relevant to cybersecurity management decisions and recommendations for collecting and consolidating that information in the service of enterprise risk management. The objective is to enable the reader to recognize, understand, and apply risk-relevant information to the analysis, evaluation, and mitigation of cybersecurity risk. A well-rounded resource, the text describes both reports and studies that improve cybersecurity decision support.</p> <p>Composed of 10 chapters, the author provides learning objectives, exercises and quiz questions per chapter in an appendix, with quiz answers and exercise grading criteria available to professors.</p> <p>Written by a highly qualified professional with significant experience in the field, <i>Stepping Through Cybersecurity Risk Management </i>includes information on:</p> <ul> <li>Threat actors and networks, attack vectors, event sources, security operations, and CISO risk evaluation criteria with respect to this activity</li> <li>Control process, policy, standard, procedures, automation, and guidelines, along with risk and control self assessment and compliance with regulatory standards</li> <li>Cybersecurity measures and metrics, and corresponding key risk indicators</li> <li>The role of humans in security, including the “three lines of defense” approach, auditing, and overall human risk management</li> <li>Risk appetite, tolerance, and categories, and analysis of alternative security approaches via reports and studies</li> </ul> <p>Providing comprehensive coverage on the topic of cybersecurity through the unique lens of perspective of enterprise governance and risk management, <i>Stepping Through Cybersecurity Risk Management </i>is an essential resource for professionals engaged in compliance with diverse business risk appetites, as well as regulatory requirements such as FFIEC, HIIPAA, and GDPR, as well as a comprehensive primer for those new to the field.<br /><br /></p> <p>A complimentary forward by Professor Gene Spafford explains why “This book will be helpful to the newcomer as well as to the hierophants in the C-suite. The newcomer can read this to understand general principles and terms. The C-suite occupants can use the material as a guide to check that their understanding encompasses all it should.”</p> <p> </p>
<p>Foreword ix</p> <p>Preface xiii</p> <p>Acknowledgements xxv</p> <p>About the Companion Website xxvii</p> <p><b>1 Framework Elements 1</b></p> <p>References 16</p> <p><b>2 Threats 17</b></p> <p>2.1 Threat Actors 17</p> <p>2.1.1 Hackivists 22</p> <p>2.1.2 Insiders 23</p> <p>2.1.3 Hacker 26</p> <p>2.1.4 Competitors 29</p> <p>2.1.5 Lone Wolf 33</p> <p>2.2 Threat Networks 33</p> <p>2.2.1 Example: Identity Theft 34</p> <p>2.2.2 Zero-Day Threats 35</p> <p>2.3 Threat Vectors 37</p> <p>References 44</p> <p><b>3 Events 47</b></p> <p>3.1 Event Classification 50</p> <p>3.2 Event Prevention 56</p> <p>3.3 Detection and Response 65</p> <p>3.4 Event Scenarios 77</p> <p>References 87</p> <p><b>4 Controls 89</b></p> <p>4.1 Risk Appetite 91</p> <p>4.2 Policy 94</p> <p>4.2.1 Security Principles 96</p> <p>4.2.2 Formality 102</p> <p>4.3 Process 106</p> <p>4.4 Standards 114</p> <p>4.4.1 Internal Standards 114</p> <p>4.4.2 External Standards 116</p> <p>4.4.3 Security Architecture 123</p> <p>4.5 Procedures 130</p> <p>4.6 Guidelines 136</p> <p>References 140</p> <p><b>5 Assessments 143</b></p> <p>5.1 Standards Adherence 147</p> <p>5.2 Risk and Control Self Assessment 154</p> <p>5.3 Pentests and Vulnscans 160</p> <p>5.4 Audits 165</p> <p>5.5 Spot Checks 169</p> <p>References 172</p> <p><b>6 Issues 173</b></p> <p>6.1 Issue Identification 174</p> <p>6.2 Classification 177</p> <p>6.3 Criteria and Remediation 180</p> <p>References 183</p> <p><b>7 Metrics 185</b></p> <p>7.1 Measuring Cybersecurity 186</p> <p>7.2 From Measures to Metrics 189</p> <p>7.3 Key Risk Indicators 205</p> <p>References 216</p> <p><b>8 People 217</b></p> <p>8.1 Three Lines of Defense 217</p> <p>8.2 The Cybersecurity Team 224</p> <p>8.3 Enterprise Management 230</p> <p>8.4 Framework Element Owners 233</p> <p>References 235</p> <p><b>9 Risks 237</b></p> <p>9.1 Risk Categories 239</p> <p>9.2 Risk Treatment 242</p> <p>9.2.1 Controls 242</p> <p>9.2.2 Transfer 242</p> <p>9.2.3 Avoidance 245</p> <p>9.2.4 Acceptance 245</p> <p>9.3 Risk Appetite 250</p> <p>9.4 Risk Tolerance 255</p> <p>9.5 Probability Measurement 260</p> <p>References 266</p> <p><b>10 Analysis 269</b></p> <p>10.1 Reports and Studies 269</p> <p>10.2 Safety Analogies 275</p> <p>10.3 Decision Support 278</p> <p>10.4 Conclusion 280</p> <p>References 282</p> <p>Appendix: Exercises in FrameCyber 283</p> <p>Index 299</p>
<p><b>Jennifer L. Bayuk </b>is a cybersecurity due diligence expert with a MS in Computer Science and a PhD in Systems Engineering. She has been a Global Financial Services Technology Risk Management Officer, a Wall Street Chief Information Security Officer, a Big 4 Information Risk Management Consultant, a Manager of Information Technology Internal Audit, a Security Architect, a Bell Labs Security Software Engineer, a Professor of Systems Security Engineering, and a Private Cybersecurity Investigator and Expert Witness
<p> <b>Authoritative resource delivering the professional practice of cybersecurity from the perspective of enterprise governance and risk management.</b> <p><i>Stepping Through Cybersecurity Risk Management </i>covers the professional practice of cybersecurity from the perspective of enterprise governance and risk management. It describes the state of the art in cybersecurity risk identification, classification, measurement, remediation, monitoring and reporting. It includes industry standard techniques for examining cybersecurity threat actors, cybersecurity attacks in the context of cybersecurity-related events, technology controls, cybersecurity measures and metrics, cybersecurity issue tracking and analysis, and risk and control assessments. <p>The text provides precise definitions for information relevant to cybersecurity management decisions and recommendations for collecting and consolidating that information in the service of enterprise risk management. The objective is to enable the reader to recognize, understand, and apply risk-relevant information to the analysis, evaluation, and mitigation of cybersecurity risk. A well-rounded resource, the text describes both reports and studies that improve cybersecurity decision support. <p>Composed of 10 chapters, the author provides learning objectives, exercises and quiz questions per chapter in an appendix, with quiz answers and exercise grading criteria available to professors. <p>Written by a highly qualified professional with significant experience in the field, <i>Stepping Through Cybersecurity Risk Management </i>includes information on: <ul><li>Threat actors and networks, attack vectors, event sources, security operations, and CISO risk evaluation criteria with respect to this activity </li><li>Control process, policy, standard, procedures, automation, and guidelines, along with risk and control self assessment and compliance with regulatory standards </li><li>Cybersecurity measures and metrics, and corresponding key risk indicators </li><li>The role of humans in security, including the “three lines of defense” approach, auditing, and overall human risk management </li><li>Risk appetite, tolerance, and categories, and analysis of alternative security approaches via reports and studies</li></ul> <p>Providing comprehensive coverage on the topic of cybersecurity through the unique lens of perspective of enterprise governance and risk management, <i>Stepping Through Cybersecurity Risk Management </i>is an essential resource for professionals engaged in compliance with diverse business risk appetites, as well as regulatory requirements such as FFIEC, HIIPAA, and GDPR, as well as a comprehensive primer for those new to the field.

Diese Produkte könnten Sie auch interessieren:

Product Realization
Product Realization
von: Mileta Tomovic, Shaoping Wang
PDF ebook
96,29 €
Rapid Prototyping
Rapid Prototyping
von: Ali K. Kamrani, Emad Abouel Nasr
PDF ebook
149,79 €
Computer Based Design and Manufacturing
Computer Based Design and Manufacturing
von: Emad Abouel Nasr, Ali K. Kamrani
PDF ebook
149,79 €