- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Cyber Risk Management in Practice: A Guide to Real-World Solutions is your companion in the ever-changing landscape of cybersecurity.
Andere Kunden interessierten sich auch für
- Jason SachowskiImplementing Digital Forensic Readiness201,99 €
- Patrick Onwura NzechukwuInternal Audit Practice from A to Z204,99 €
- Ioannis S AkkizidisGuide to Optimal Operational Risk and BASEL II183,99 €
- Thomas R PeltierHow to Complete a Risk Assessment in 5 Days or Less167,99 €
- Ravi DasBusiness Recovery and Continuity in a Mega Disaster156,99 €
- Ralph L KliemBusiness Continuity Planning168,99 €
- Lynn FountainLeading the Internal Audit Function90,99 €
-
-
-
Cyber Risk Management in Practice: A Guide to Real-World Solutions is your companion in the ever-changing landscape of cybersecurity.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 304
- Erscheinungstermin: 17. Juni 2025
- Englisch
- Abmessung: 234mm x 156mm
- ISBN-13: 9781032842387
- ISBN-10: 1032842385
- Artikelnr.: 72701589
- Herstellerkennzeichnung
- Produktsicherheitsverantwortliche/r
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 304
- Erscheinungstermin: 17. Juni 2025
- Englisch
- Abmessung: 234mm x 156mm
- ISBN-13: 9781032842387
- ISBN-10: 1032842385
- Artikelnr.: 72701589
- Herstellerkennzeichnung
- Produktsicherheitsverantwortliche/r
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
Carlos Morales, MBA, CISM, GRC-P, GRC-A, CRISC, CDPSE, IDPP, IPMP, IAAP Carlos Morales, with over 15 years of extensive experience in the cybersecurity and risk management fields, has become a distinguished figure in the industry. His journey through the areas of privacy, information security, and risk management is marked by significant achievements and contributions. Carlos holds a master's degree from the Instituto Tecnológico y de Estudios Superiores de Monterrey (ITESM), and he has earned a suite of prestigious certifications, including Certified Information Security Manager (CISM), Certified in Risk and Information Systems Control (CRISC), and Certified Data Privacy Solutions Engineer (CDPSE), and all OCEG certifications, showcasing his dedication to excellence in cybersecurity. Carlos professional journey is highlighted by roles at leading organizations, such as Irving Oil and FEMSA, where he designed and implemented initiatives to enhance cybersecurity risk management and resilience bringing operational efficiencies across diverse industries and regions. His innovative approach to integrating cyber risk management with business strategies has led to significant advancements in all organizations he has work with. Throughout his various roles, he has developed new, pragmatic services tailored to meet the unique needs of clients, helping them to better understand the value of cyber risk management and guiding them through its pragmatic implementation. His work in developing a risk-based model for organizations, irrespective of their industry or size, has been instrumental in improving decision-making processes through pragmatic risk management programs. Beyond his professional endeavors, Carlos has actively contributed to the cybersecurity community as a professor of practice in the cybersecurity master's degree program at ITESM University, advising the ITESM Cybersecurity HUB, and as a member of various councils and forums, including the Canadian Cybersecurity Forum positively impacting the Canadian cybersecurity ecosystem. His international engagements, such as advising on cybersecurity matters for the Executive Office of the President of Mexico, and collaboration with the Organization of American States (OAS) on Cybersecurity Innovation Councils, highlight his commitment to advancing cybersecurity strategies on a global scale.
INTRODUCTION
SECTION 1: MASTERING RISK MANAGEMENT ESSENTIALS.
FUNDAMENTALS OF RISK MANAGEMENT
CYBER RISK MANAGEMENT FRAMEWORKS
OVERVIEW OF THE 5 STEPS OF RISK MANAGEMENT
Risk Context
Risk Assessment
Risk Treatment Planning
Risk Treatment Plans implementation
Risk Monitoring
RISK REGISTER
GOVERNANCE AND CYBERSECURITY CULTURE
Starting with Cyber Risk Management
Aligning Corporate Governance and Security Culture
SECTION 2: EXECUTING RISK MANAGEMENT, A STEP-BY-STEP GUIDE
STARTING THE PROCESS: SCOPE AND INFORMATION GATHERING
Understanding Your Environment
Defining the Scope
Gathering Essential Information
RISK ASSESSMENT: FROM IDENTIFICATION TO CHARACTERIZATION
The Art of Risk Identification
Assessing the Impact and Likelihood of Risks
Risk Characterization: Aggregation of Risks Above the Risk Appetite
RISK TREATMENT STRATEGIES
Exploring Risk Treatment Options
Selecting the Optimal Path Forward
MAKING THINGS HAPPEN: SECURITY INITIATIVES IMPLEMENTATION
EPective Risk Communication Strategies
Putting Plans into Action: Implementation of Risk Treatment Measures
RISK MONITORING AND METRICS
Ongoing Monitoring Practices
Utilizing KPIs and KRIs for Insight and Oversight
SECTION 3: BEYOND BASICS, ELEVATING TO CYBER RESILIENCE
BUILDING CYBER RESILIENCE
Principles of Cyber Resilience
Strategies for Enhancing Organizational Resilience
Case Studies on Recovering from Cyber Incidents
THIRD-PARTY RISK MANAGEMENT
Understanding Third-Party Risks in the Supply Chain
Due Diligence and Assurance Processes for Third Parties
ADVANCING TOWARDS RISK QUANTIFICATION
Current Challenges in Cyber Risk Management
Transitioning to Risk Quantification: Approaches and Tools
CONCLUSION
SUMMARY OF KEY LEARNINGS
NEXT STEPS FOR EFFECTIVE RISK MANAGEMENT IMPLEMENTATION
SECTION 1: MASTERING RISK MANAGEMENT ESSENTIALS.
FUNDAMENTALS OF RISK MANAGEMENT
CYBER RISK MANAGEMENT FRAMEWORKS
OVERVIEW OF THE 5 STEPS OF RISK MANAGEMENT
Risk Context
Risk Assessment
Risk Treatment Planning
Risk Treatment Plans implementation
Risk Monitoring
RISK REGISTER
GOVERNANCE AND CYBERSECURITY CULTURE
Starting with Cyber Risk Management
Aligning Corporate Governance and Security Culture
SECTION 2: EXECUTING RISK MANAGEMENT, A STEP-BY-STEP GUIDE
STARTING THE PROCESS: SCOPE AND INFORMATION GATHERING
Understanding Your Environment
Defining the Scope
Gathering Essential Information
RISK ASSESSMENT: FROM IDENTIFICATION TO CHARACTERIZATION
The Art of Risk Identification
Assessing the Impact and Likelihood of Risks
Risk Characterization: Aggregation of Risks Above the Risk Appetite
RISK TREATMENT STRATEGIES
Exploring Risk Treatment Options
Selecting the Optimal Path Forward
MAKING THINGS HAPPEN: SECURITY INITIATIVES IMPLEMENTATION
EPective Risk Communication Strategies
Putting Plans into Action: Implementation of Risk Treatment Measures
RISK MONITORING AND METRICS
Ongoing Monitoring Practices
Utilizing KPIs and KRIs for Insight and Oversight
SECTION 3: BEYOND BASICS, ELEVATING TO CYBER RESILIENCE
BUILDING CYBER RESILIENCE
Principles of Cyber Resilience
Strategies for Enhancing Organizational Resilience
Case Studies on Recovering from Cyber Incidents
THIRD-PARTY RISK MANAGEMENT
Understanding Third-Party Risks in the Supply Chain
Due Diligence and Assurance Processes for Third Parties
ADVANCING TOWARDS RISK QUANTIFICATION
Current Challenges in Cyber Risk Management
Transitioning to Risk Quantification: Approaches and Tools
CONCLUSION
SUMMARY OF KEY LEARNINGS
NEXT STEPS FOR EFFECTIVE RISK MANAGEMENT IMPLEMENTATION
INTRODUCTION
SECTION 1: MASTERING RISK MANAGEMENT ESSENTIALS.
FUNDAMENTALS OF RISK MANAGEMENT
CYBER RISK MANAGEMENT FRAMEWORKS
OVERVIEW OF THE 5 STEPS OF RISK MANAGEMENT
Risk Context
Risk Assessment
Risk Treatment Planning
Risk Treatment Plans implementation
Risk Monitoring
RISK REGISTER
GOVERNANCE AND CYBERSECURITY CULTURE
Starting with Cyber Risk Management
Aligning Corporate Governance and Security Culture
SECTION 2: EXECUTING RISK MANAGEMENT, A STEP-BY-STEP GUIDE
STARTING THE PROCESS: SCOPE AND INFORMATION GATHERING
Understanding Your Environment
Defining the Scope
Gathering Essential Information
RISK ASSESSMENT: FROM IDENTIFICATION TO CHARACTERIZATION
The Art of Risk Identification
Assessing the Impact and Likelihood of Risks
Risk Characterization: Aggregation of Risks Above the Risk Appetite
RISK TREATMENT STRATEGIES
Exploring Risk Treatment Options
Selecting the Optimal Path Forward
MAKING THINGS HAPPEN: SECURITY INITIATIVES IMPLEMENTATION
EPective Risk Communication Strategies
Putting Plans into Action: Implementation of Risk Treatment Measures
RISK MONITORING AND METRICS
Ongoing Monitoring Practices
Utilizing KPIs and KRIs for Insight and Oversight
SECTION 3: BEYOND BASICS, ELEVATING TO CYBER RESILIENCE
BUILDING CYBER RESILIENCE
Principles of Cyber Resilience
Strategies for Enhancing Organizational Resilience
Case Studies on Recovering from Cyber Incidents
THIRD-PARTY RISK MANAGEMENT
Understanding Third-Party Risks in the Supply Chain
Due Diligence and Assurance Processes for Third Parties
ADVANCING TOWARDS RISK QUANTIFICATION
Current Challenges in Cyber Risk Management
Transitioning to Risk Quantification: Approaches and Tools
CONCLUSION
SUMMARY OF KEY LEARNINGS
NEXT STEPS FOR EFFECTIVE RISK MANAGEMENT IMPLEMENTATION
SECTION 1: MASTERING RISK MANAGEMENT ESSENTIALS.
FUNDAMENTALS OF RISK MANAGEMENT
CYBER RISK MANAGEMENT FRAMEWORKS
OVERVIEW OF THE 5 STEPS OF RISK MANAGEMENT
Risk Context
Risk Assessment
Risk Treatment Planning
Risk Treatment Plans implementation
Risk Monitoring
RISK REGISTER
GOVERNANCE AND CYBERSECURITY CULTURE
Starting with Cyber Risk Management
Aligning Corporate Governance and Security Culture
SECTION 2: EXECUTING RISK MANAGEMENT, A STEP-BY-STEP GUIDE
STARTING THE PROCESS: SCOPE AND INFORMATION GATHERING
Understanding Your Environment
Defining the Scope
Gathering Essential Information
RISK ASSESSMENT: FROM IDENTIFICATION TO CHARACTERIZATION
The Art of Risk Identification
Assessing the Impact and Likelihood of Risks
Risk Characterization: Aggregation of Risks Above the Risk Appetite
RISK TREATMENT STRATEGIES
Exploring Risk Treatment Options
Selecting the Optimal Path Forward
MAKING THINGS HAPPEN: SECURITY INITIATIVES IMPLEMENTATION
EPective Risk Communication Strategies
Putting Plans into Action: Implementation of Risk Treatment Measures
RISK MONITORING AND METRICS
Ongoing Monitoring Practices
Utilizing KPIs and KRIs for Insight and Oversight
SECTION 3: BEYOND BASICS, ELEVATING TO CYBER RESILIENCE
BUILDING CYBER RESILIENCE
Principles of Cyber Resilience
Strategies for Enhancing Organizational Resilience
Case Studies on Recovering from Cyber Incidents
THIRD-PARTY RISK MANAGEMENT
Understanding Third-Party Risks in the Supply Chain
Due Diligence and Assurance Processes for Third Parties
ADVANCING TOWARDS RISK QUANTIFICATION
Current Challenges in Cyber Risk Management
Transitioning to Risk Quantification: Approaches and Tools
CONCLUSION
SUMMARY OF KEY LEARNINGS
NEXT STEPS FOR EFFECTIVE RISK MANAGEMENT IMPLEMENTATION