The Cyber Risk Handbook cover art

The Cyber Risk Handbook

Creating and Measuring Effective Cybersecurity Capabilities

Preview

£0.00 for first 30 days

Try for £0.00
Pick 1 audiobook a month from our unmatched collection - including bestsellers and new releases.
Listen all you want to thousands of included audiobooks, Originals, celeb exclusives, and podcasts.
Access exclusive sales and deals.
£7.99/month after 30 days. Renews automatically. See here for eligibility.

The Cyber Risk Handbook

By: Domenic Antonucci
Narrated by: Mark Schectman
Try for £0.00

£7.99/month after 30 days. Renews automatically. See here for eligibility.

Buy Now for £18.99

Buy Now for £18.99

Confirm Purchase
Pay using card ending in
By completing your purchase, you agree to Audible's Conditions of Use and authorise Audible to charge your designated card or any other card on file. Please see our Privacy Notice, Cookies Notice and Interest-based Ads Notice.
Cancel

About this listen

Actionable guidance and expert perspective for real-world cybersecurity

The Cyber Risk Handbook is the practitioner's guide to implementing, measuring, and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world situations, and cross-functional solutions for enterprise-wide improvement. Beginning with an overview of counter-cyber evolution, the discussion quickly turns practical with design and implementation guidance for the range of capabilities expected of a robust cyber risk management system that is integrated with the enterprise risk management (ERM) system. Expert contributors from around the globe weigh in on specialized topics with tools and techniques to help any type or size of organization create a robust system tailored to its needs. Chapter summaries of required capabilities are aggregated to provide a new cyber risk maturity model used to benchmark capabilities and to road-map gap improvement.

Cyber risk is a fast-growing enterprise risk, not just an IT risk. Yet seldom is guidance provided as to what this means. This book is the first to tackle in detail those enterprise-wide capabilities expected by board, CEO, and internal audit, of the diverse executive management functions that need to team up with the Information Security function in order to provide integrated solutions.

  • Learn how cyber risk management can be integrated to better protect your enterprise
  • Design and benchmark new and improved practical counter-cyber capabilities
  • Examine planning and implementation approaches, models, methods, and more
  • Adopt a new cyber risk maturity model tailored to your enterprise needs

The need to manage cyber risk across the enterprise - inclusive of the IT operations - is a growing concern as massive data breaches make the news on an alarmingly frequent basis. With a cyber risk management system now a business-necessary requirement, practitioners need to assess the effectiveness of their current system, and measure its gap-improvement over time in response to a dynamic and fast-moving threat landscape. The Cyber Risk Handbook brings the world's best thinking to bear on aligning that system to the enterprise and vice-a-versa. Every functional head of any organization must have a copy at-hand to understand their role in achieving that alignment.

PLEASE NOTE: When you purchase this title, the accompanying reference material will be available in your My Library section along with the audio.

©2017 John Wiley & Sons, Inc. (P)2017 Audible, Inc.
Management Money & Finance Security & Encryption Business Computer Security Hacking Risk Management Career Project Management Software Development
activate_Holiday_promo_in_buybox_DT_T2

Listeners also enjoyed...

Cyber Intelligence Driven Risk cover art
Prepare for the ISACA Certified Information Security Manager Exam cover art
The CISO Evolution cover art
Cybersecurity for Dummies cover art
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide cover art
The Lazarus Heist cover art
Cybersecurity cover art
Sandworm cover art
Social Engineering, Second Edition cover art
Trustworthy AI cover art
Zero Trust and Third-Party Risk cover art
The AMA Handbook of Project Management, Fifth Edition cover art
ITIL Foundation Essentials ITIL 4 Edition cover art
Nine Steps to Success cover art
Essential CISM: Updated for the 16th Edition CISM Review Manual cover art
A Leader’s Guide to Cybersecurity cover art

What listeners say about The Cyber Risk Handbook

Average customer ratings
Overall
  • 4 out of 5 stars
  • 5 Stars
    2
  • 4 Stars
    2
  • 3 Stars
    1
  • 2 Stars
    1
  • 1 Stars
    0
Performance
  • 4 out of 5 stars
  • 5 Stars
    3
  • 4 Stars
    1
  • 3 Stars
    1
  • 2 Stars
    1
  • 1 Stars
    0
Story
  • 4 out of 5 stars
  • 5 Stars
    2
  • 4 Stars
    2
  • 3 Stars
    1
  • 2 Stars
    1
  • 1 Stars
    0

Reviews - Please select the tabs below to change the source of reviews.

Sort by:
Filter by:
  • Overall
    2 out of 5 stars
  • Performance
    2 out of 5 stars
  • Story
    2 out of 5 stars

No pdf

No PDF means all the references are useless. I was enjoying it until i looked for diagrams

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

1 person found this helpful