How to Measure Anything in Cybersecurity Risk
4.5/5
()
About this ebook
A start-to-finish guide for realistically measuring cybersecurity risk
In the newly revised How to Measure Anything in Cybersecurity Risk, Second Edition, a pioneering information security professional and a leader in quantitative analysis methods delivers yet another eye-opening text applying the quantitative language of risk analysis to cybersecurity. In the book, the authors demonstrate how to quantify uncertainty and shed light on how to measure seemingly intangible goals. It's a practical guide to improving risk assessment with a straightforward and simple framework.
Advanced methods and detailed advice for a variety of use cases round out the book, which also includes:
- A new “Rapid Risk Audit” for a first quick quantitative risk assessment.
- New research on the real impact of reputation damage
- New Bayesian examples for assessing risk with little data
- New material on simple measurement and estimation, pseudo-random number generators, and advice on combining expert opinion
Dispelling long-held beliefs and myths about information security, How to Measure Anything in Cybersecurity Risk is an essential roadmap for IT security managers, CFOs, risk and compliance professionals, and even statisticians looking for novel new ways to apply quantitative techniques to cybersecurity.
Read more from Douglas W. Hubbard
How to Measure Anything: Finding the Value of Intangibles in Business Rating: 4 out of 5 stars4/5How to Measure Anything Workbook: Finding the Value of Intangibles in Business Rating: 4 out of 5 stars4/5The Failure of Risk Management: Why It's Broken and How to Fix It Rating: 0 out of 5 stars0 ratingsThe Metrics Manifesto: Confronting Security with Data Rating: 0 out of 5 stars0 ratings
Related to How to Measure Anything in Cybersecurity Risk
Related ebooks
Threat Modeling: Designing for Security Rating: 4 out of 5 stars4/5How to Measure Anything in Cybersecurity Risk Rating: 4 out of 5 stars4/5The CISO Evolution: Business Knowledge for Cybersecurity Executives Rating: 0 out of 5 stars0 ratingsAlice and Bob Learn Application Security Rating: 0 out of 5 stars0 ratingsCyber Breach Response That Actually Works: Organizational Approach to Managing Residual Risk Rating: 0 out of 5 stars0 ratingsCISM Certified Information Security Manager Study Guide Rating: 0 out of 5 stars0 ratingsThreat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks Rating: 0 out of 5 stars0 ratings(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide Rating: 3 out of 5 stars3/5CompTIA Security+ Study Guide with over 500 Practice Test Questions: Exam SY0-701 Rating: 0 out of 5 stars0 ratingsPython for Cybersecurity: Using Python for Cyber Offense and Defense Rating: 0 out of 5 stars0 ratingsThe Official (ISC)2 Guide to the CCSP CBK Rating: 0 out of 5 stars0 ratingsThe Cloud Security Ecosystem: Technical, Legal, Business and Management Issues Rating: 0 out of 5 stars0 ratingsProject Zero Trust: A Story about a Strategy for Aligning Security and the Business Rating: 0 out of 5 stars0 ratings11 Strategies of a World-Class Cybersecurity Operations Center Rating: 0 out of 5 stars0 ratingsImplementing Zero Trust Architecture: An Enterprise Guide Rating: 5 out of 5 stars5/5Cybersecurity First Principles: A Reboot of Strategy and Tactics Rating: 5 out of 5 stars5/5The Five Anchors of Cyber Resilience: Why some enterprises are hacked into bankruptcy, while others easily bounce back Rating: 0 out of 5 stars0 ratingsThe Human Fix to Human Risk: 5 Steps to Fostering a Culture of Cyber Security Awareness Rating: 0 out of 5 stars0 ratingsNavigating the Cybersecurity Career Path Rating: 0 out of 5 stars0 ratingsCyber Security Consultants Playbook Rating: 0 out of 5 stars0 ratingsNIST Cybersecurity Framework: A pocket guide Rating: 0 out of 5 stars0 ratingsFire Doesn’t Innovate: The Executive’s Practical Guide to Thriving in the Face of Evolving Cyber Risks Rating: 0 out of 5 stars0 ratingsA Convenient Guide to Starting You on Threat Modeling Rating: 0 out of 5 stars0 ratingsManaging Cybersecurity Risk: Book 3 Rating: 0 out of 5 stars0 ratingsSecurity Engineering: A Guide to Building Dependable Distributed Systems Rating: 4 out of 5 stars4/5Cybersecurity Program Development for Business: The Essential Planning Guide Rating: 0 out of 5 stars0 ratingsBuild a Security Culture Rating: 0 out of 5 stars0 ratingsThe Cybersecurity Maturity Model Certification (CMMC) – A pocket guide Rating: 0 out of 5 stars0 ratingsExecutive's Guide to Cyber Risk: Securing the Future Today Rating: 0 out of 5 stars0 ratingsOperationalizing Information Security: Putting the Top 10 SIEM Best Practices to Work Rating: 0 out of 5 stars0 ratings
Business For You
The Richest Man in Babylon: The most inspiring book on wealth ever written Rating: 5 out of 5 stars5/5Set for Life: An All-Out Approach to Early Financial Freedom Rating: 4 out of 5 stars4/5Summary of J.L. Collins's The Simple Path to Wealth Rating: 5 out of 5 stars5/5Financial Words You Should Know: Over 1,000 Essential Investment, Accounting, Real Estate, and Tax Words Rating: 4 out of 5 stars4/5The Intelligent Investor, Rev. Ed: The Definitive Book on Value Investing Rating: 4 out of 5 stars4/5Your Next Five Moves: Master the Art of Business Strategy Rating: 5 out of 5 stars5/5Carol Dweck's Mindset The New Psychology of Success: Summary and Analysis Rating: 4 out of 5 stars4/5Emotional Intelligence: Exploring the Most Powerful Intelligence Ever Discovered Rating: 5 out of 5 stars5/5Collaborating with the Enemy: How to Work with People You Don’t Agree with or Like or Trust Rating: 4 out of 5 stars4/5Tools Of Titans: The Tactics, Routines, and Habits of Billionaires, Icons, and World-Class Performers Rating: 4 out of 5 stars4/5Confessions of an Economic Hit Man, 3rd Edition Rating: 5 out of 5 stars5/5The Hard Thing About Hard Things: Building a Business When There Are No Easy Answers Rating: 4 out of 5 stars4/5Crucial Conversations Tools for Talking When Stakes Are High, Second Edition Rating: 4 out of 5 stars4/5Law of Connection: Lesson 10 from The 21 Irrefutable Laws of Leadership Rating: 4 out of 5 stars4/5Leadership and Self-Deception: Getting out of the Box Rating: 4 out of 5 stars4/5Becoming Bulletproof: Protect Yourself, Read People, Influence Situations, and Live Fearlessly Rating: 4 out of 5 stars4/5Robert's Rules Of Order Rating: 5 out of 5 stars5/5Crucial Conversations: Tools for Talking When Stakes are High, Third Edition Rating: 4 out of 5 stars4/5Lying Rating: 4 out of 5 stars4/5The Catalyst: How to Change Anyone's Mind Rating: 4 out of 5 stars4/5How to Grow Your Small Business: A 6-Step Plan to Help Your Business Take Off Rating: 4 out of 5 stars4/5How to Get Ideas Rating: 5 out of 5 stars5/5Nickel and Dimed: On (Not) Getting By in America Rating: 4 out of 5 stars4/5Robert's Rules of Order: The Original Manual for Assembly Rules, Business Etiquette, and Conduct Rating: 4 out of 5 stars4/5
Reviews for How to Measure Anything in Cybersecurity Risk
5 ratings1 review
- Rating: 4 out of 5 stars4/5This book is an expansion of the Author's previous edition - "How to Measure Anything" - applied to cyber security. The drive of this edition is clearly towards quantitative analysis, in contrast to the typical cyber risk analysis which is qualitative. The Author introduces several novel concepts, all based on cost/risk balance, to explore making this science more dependent on placing confidence intervals around expert opinions, making those opinions have a quantitative bearing. It's worth the read if you are exploring this field.