Optimal Spending on Cybersecurity Measures: Third Party Risk Management introduces the cyber risk investment model, and the cybersecurity risk management framework used within business-driven risk assessments to address government regulations, industry standards and applicable Laws.
Optimal Spending on Cybersecurity Measures: Third Party Risk Management introduces the cyber risk investment model, and the cybersecurity risk management framework used within business-driven risk assessments to address government regulations, industry standards and applicable Laws.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Sherita-Tara (Tara) Kissoon, MSc, MBA, CISSP, CISA, is a multi-certified I.T. Risk & Security Leader with twenty-five years of technology experience, twenty years of experience in the financial services industry focusing on technology, cybersecurity, governance, risk and compliance, along with professional and community volunteering. Tare actively volunteering at ISACA, ISC2, University of London and St. Patrick's Parish in Markham, and have attained my Enhanced Police Information Check (E-PIC), Vulnerable Sector Check, NEXUS, Biometrics, Bail Verification and maintain medical records for identity verification, to volunteer/work in high-risk communities, and cross borders as a trusted traveler. Tara Kissoon is a multi-certified I.T. Risk & Security Leader with 25+ years of technology experience, 20 years of executive experience in the financial services industry. She brings continued success on leading Technology, I.T. Risk and Information Security projects and programs within large organizations. She is acknowledged as a leader and trusted advisor with a talent for effective resource management, steering traditional and diverse cross-functional staff to achieve short and long-term business objectives. Relevant Publication include (ORCID: 0000-0001-6903-1938) - 1) Book (2024): Routledge (Taylor & Francis) Optimal Spending on Cybersecurity Measures: Protecting Health Information 2) Book (2024): Routledge (Taylor & Francis) Optimal Spending on Cybersecurity Measures: Digital Privacy and Data Protection 3) Book (2024): Routledge (Taylor & Francis) Optimal Spending on Cybersecurity Measures: DevOps, 4) Book (2022): Routledge (Taylor & Francis) Optimal Spending on Cybersecurity Measures: Risk Management, 5) Article (2021): Journal of Information Security (Vol.12 No.1, Jan 2021) - Optimum Spending on Cybersecurity Measures Part II, 6) Article (2020): Emerald Publishing Limited - Optimum Spending on Cybersecurity Measures, 7) ISACA TIPs column (2012 - 2014), and 8) ISACA Online Journal (2008): Strengthening Access using Smart Cards. CV is enclosed.
Inhaltsangabe
Preface About the Author Chapter 1: Introduction Chapter 2: Privacy Laws Chapter 3: Data Protection Chapter 4: Third Party Risk Management Chapter 5: Technology and Cyber Risk Chapter 6: Governance Chapter 7: Cybersecurity Risk Management Framework Chapter 8: Case Study #1: Chime Live Chapter 9: Case Study #2 - Alumni Learning Consortium Chapter 10: Case Study #3 - Marketing Automation Tool
Preface About the Author Chapter 1: Introduction Chapter 2: Privacy Laws Chapter 3: Data Protection Chapter 4: Third Party Risk Management Chapter 5: Technology and Cyber Risk Chapter 6: Governance Chapter 7: Cybersecurity Risk Management Framework Chapter 8: Case Study #1: Chime Live Chapter 9: Case Study #2 - Alumni Learning Consortium Chapter 10: Case Study #3 - Marketing Automation Tool
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826