Audiobook8 hours
Building a Cyber Risk Management Program: Evolving Security for the Digital Age
Written by Brian Allen, Brandon Bapst and Terry Allan Hicks
Narrated by Mike Lenz
Rating: 0 out of 5 stars
()
About this audiobook
Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for designing, developing, and implementing a cyber risk management program that addresses your company's specific needs. Ideal for corporate directors, senior executives, security risk practitioners, and auditors at many levels, this guide offers both the strategic insight and tactical guidance you're looking for.
You'll learn how to define and establish a sustainable, defendable, cyber risk management program, and the benefits associated with proper implementation. Cyber risk management experts Brian Allen and Brandon Bapst, working with writer Terry Allan Hicks, also provide advice that goes beyond risk management. You'll discover ways to address your company's oversight obligations as defined by international standards, case law, regulation, and board-level guidance.
This book helps you: understand the transformational changes digitalization is introducing, and new cyber risks that come with it; learn the key legal and regulatory drivers that make cyber risk management a mission-critical priority for enterprises; gain a complete understanding of four components that make up a formal cyber risk management program; and implement or provide guidance for a cyber risk management program within your enterprise.
You'll learn how to define and establish a sustainable, defendable, cyber risk management program, and the benefits associated with proper implementation. Cyber risk management experts Brian Allen and Brandon Bapst, working with writer Terry Allan Hicks, also provide advice that goes beyond risk management. You'll discover ways to address your company's oversight obligations as defined by international standards, case law, regulation, and board-level guidance.
This book helps you: understand the transformational changes digitalization is introducing, and new cyber risks that come with it; learn the key legal and regulatory drivers that make cyber risk management a mission-critical priority for enterprises; gain a complete understanding of four components that make up a formal cyber risk management program; and implement or provide guidance for a cyber risk management program within your enterprise.
Related to Building a Cyber Risk Management Program
Related audiobooks
Zero Trust and Third-Party Risk: Reduce the Blast Radius Rating: 0 out of 5 stars0 ratingsAlice and Bob Learn Application Security Rating: 5 out of 5 stars5/5A Leader's Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Rating: 0 out of 5 stars0 ratingsCybersecurity: The Insights You Need from Harvard Business Review Rating: 5 out of 5 stars5/5How Cyber Security Can Protect Your Business: A guide for all stakeholders Rating: 0 out of 5 stars0 ratingsDigital Resilience: Is Your Company Ready for the Next Cyber Threat? Rating: 4 out of 5 stars4/5Malware Analysis: Digital Forensics, Cybersecurity, And Incident Response Rating: 0 out of 5 stars0 ratingsRethinking IT Security: What Needs to Be Said — How Can We Solve the IT Security Problem Long Term? Rating: 0 out of 5 stars0 ratingsPhishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails Rating: 4 out of 5 stars4/5The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer Rating: 5 out of 5 stars5/5How to Measure Anything in Cybersecurity Risk, 2nd Edition Rating: 0 out of 5 stars0 ratingsSecurity Chaos Engineering: Sustaining Resilience in Software and Systems Rating: 0 out of 5 stars0 ratingsThe CISO Evolution: Business Knowledge for Cybersecurity Executives Rating: 5 out of 5 stars5/5The Pentester BluePrint: Starting a Career as an Ethical Hacker Rating: 5 out of 5 stars5/5Start-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit Rating: 0 out of 5 stars0 ratingsNIST Cloud Security: Cyber Threats, Policies, And Best Practices Rating: 5 out of 5 stars5/5The Psychology of Information Security: Resolving conflicts between security compliance and human behaviour Rating: 0 out of 5 stars0 ratingsTCP/IP: Network+ Protocols And Campus LAN Switching Fundamentals Rating: 0 out of 5 stars0 ratingsCISSP: Simple and Effective Strategies for Mastering Information Systems Security from A-Z Rating: 0 out of 5 stars0 ratingsDocker Unboxed: Mastering Modern Infrastructure with Container Technology Rating: 0 out of 5 stars0 ratingsISO27001/ISO27002:2013: A Pocket Guide Rating: 0 out of 5 stars0 ratingsDigital Earth: Cyber threats, privacy and ethics in an age of paranoia Rating: 0 out of 5 stars0 ratingsCybersecurity in Healthcare: A National Study of HIPAA Implementation Rating: 0 out of 5 stars0 ratingsCybersecurity Handbook for Small to Mid-size Businesses Rating: 0 out of 5 stars0 ratingsCyber Warfare in 2022+ Rating: 0 out of 5 stars0 ratingsHow to Build a Cyber-Resilient Organization Rating: 0 out of 5 stars0 ratingsSummary of Steven Pinker's The Sense of Style Rating: 0 out of 5 stars0 ratingsISO 27001 Controls – A guide to implementing and auditing Rating: 0 out of 5 stars0 ratings
Business For You
Silva Mind Control Method Of Mental Dynamics Rating: 5 out of 5 stars5/5Becoming Bulletproof: Protect Yourself, Read People, Influence Situations, and Live Fearlessly Rating: 5 out of 5 stars5/5Your Next Five Moves: Master the Art of Business Strategy Rating: 5 out of 5 stars5/5The Charisma Myth: How Anyone Can Master the Art and Science of Personal Magnetism (Intl Ed) Rating: 5 out of 5 stars5/5Rich Dad Poor Dad: What The Rich Teach Their Kids About Money - That the Poor and Middle Class Do Not! Rating: 5 out of 5 stars5/5Think Faster, Talk Smarter: How to Speak Successfully When You're Put on the Spot Rating: 4 out of 5 stars4/5The Energy Bus: 10 Rules to Fuel Your Life, Work, and Team with Positive Energy Rating: 5 out of 5 stars5/5Seeing What Others Don't: The Remarkable Ways We Gain Insights Rating: 4 out of 5 stars4/5The TenX Rule: The Only Difference Between Success and Failure Rating: 5 out of 5 stars5/5Algorithms to Live By: The Computer Science of Human Decisions Rating: 4 out of 5 stars4/5How to Manage Your Money When You Don't Have Any Rating: 4 out of 5 stars4/5How To Win Friends And Influence People Rating: 4 out of 5 stars4/5Extreme Ownership: How U.S. Navy SEALs Lead and Win Rating: 5 out of 5 stars5/5Getting to Yes: How to Negotiate Agreement Without Giving In Rating: 4 out of 5 stars4/5Getting Things Done: The Art of Stress-Free Productivity Rating: 4 out of 5 stars4/5The Hard Thing About Hard Things: Building a Business When There Are No Easy Answers Rating: 5 out of 5 stars5/5The New One Minute Manager Rating: 5 out of 5 stars5/5Essentialism by Greg McKeown - Book Summary: The Disciplined Pursuit of Less Rating: 5 out of 5 stars5/5How To Lie With Statistics Rating: 4 out of 5 stars4/5The Sociopath Next Door: The Ruthless Versus the Rest of Us Rating: 4 out of 5 stars4/5Company Rules: Or Everything I Know About Business I Learned from the CIA Rating: 4 out of 5 stars4/5The Millionaire Next Door: The Surprising Secrets Of Americas Wealthy Rating: 5 out of 5 stars5/5The Critical Moments: Navigating Power Plays, Outbursts, Ultimatums, and More Rating: 4 out of 5 stars4/5Anthem Rating: 4 out of 5 stars4/5Win Every Argument: The Art of Debating, Persuading, and Public Speaking Rating: 5 out of 5 stars5/5You Will Own Nothing: Your War with a New Financial World Order and How to Fight Back Rating: 4 out of 5 stars4/5The Artist's Way at Work: Riding the Dragon: Twelve Weeks to Creative Freedom Rating: 4 out of 5 stars4/5
Reviews for Building a Cyber Risk Management Program
Rating: 0 out of 5 stars
0 ratings
0 ratings0 reviews