Ariel Evans
Enterprise Cybersecurity in Digital Business (eBook, ePUB)
Building a Cyber Resilient Organization
39,95 €
39,95 €
inkl. MwSt.
Sofort per Download lieferbar
20 °P sammeln
39,95 €
Als Download kaufen
39,95 €
inkl. MwSt.
Sofort per Download lieferbar
20 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
39,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
20 °P sammeln
Ariel Evans
Enterprise Cybersecurity in Digital Business (eBook, ePUB)
Building a Cyber Resilient Organization
- Format: ePub
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
Enterprise Cybersecurity in Digital Business: Building a Cyber Resilient Organization provides a clear guide for companies to understand cyber from a business perspective rather than a technical perspective, and to build resilience for their business.
- Geräte: eReader
- ohne Kopierschutz
- eBook Hilfe
- Größe: 11.89MB
Andere Kunden interessierten sich auch für
- Ariel EvansEnterprise Cybersecurity in Digital Business (eBook, PDF)39,95 €
- Robert James ChapmanThe SME Business Guide to Fraud Risk Management (eBook, ePUB)34,95 €
- Routledge Handbook of Risk Management and the Law (eBook, ePUB)46,95 €
- Mark FoulshamGDPR (eBook, ePUB)37,95 €
- Charles SwansonThe Security Risk Handbook (eBook, ePUB)48,95 €
- Jean PeroisThreats in Context (eBook, ePUB)58,95 €
- Disa ChounDigital Health and Patient Data (eBook, ePUB)34,95 €
-
-
-
Enterprise Cybersecurity in Digital Business: Building a Cyber Resilient Organization provides a clear guide for companies to understand cyber from a business perspective rather than a technical perspective, and to build resilience for their business.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis
- Seitenzahl: 562
- Erscheinungstermin: 22. März 2022
- Englisch
- ISBN-13: 9781000459371
- Artikelnr.: 63642623
- Verlag: Taylor & Francis
- Seitenzahl: 562
- Erscheinungstermin: 22. März 2022
- Englisch
- ISBN-13: 9781000459371
- Artikelnr.: 63642623
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Ariel Evans is the CEO of Cyber Intelligence 4U and a Senior Cyber Security Expert and an Entrepreneur based in Israel. She also is the Enterprise Cybersecurity Chairperson at Rutgers and Pace Universities.
Part I: The Evolution of Cybersecurity. 1. Cyber - A business Issue 2. 'Cyber Risk' 3. 'The History of Cybersecurity' 4. 'Cyber Consequences' 5. 'Cyber Trends and Spending' 6. 'Cyber Roles' Part II: Cybersecurity Basics. 7. 'Cyber -Attack Surfaces and Digital Asset Inventories' 8. 'Cyber Terminology and Statistics' 9. 'Enterprise Threats of Today and Cybercriminals' 10. 'Cybersecurity Regulations, Standards and Frameworks' 11. 'Enterprise Cybersecurity Programs' 12. 'Organizational Cyber Maturities' Part III: Cybersecurity Tools. 13. 'Cyber Policies' 14. 'Cybersecurity Tools Part IV: Cybersecurity Regulation.
15. 'U.S. Federal Regulations' 16. 'U.S. State Regulations' 17. 'New York State Department of Financial Services Part 500' 18. 'Global, Industry or Other Types of Cybersecurity Regulations' Part V: Incident Response, Forensics and Audit. 19. 'Incident Response Plans' 20. 'Forensic Methods' 21. 'IT Audit'
Part VI: Cybersecurity Risk Management. 22. 'Cybersecurity Financial Exposures' 23. 'Digital Asset Cyber Risk Modeling and Scoring' 24. 'Mitigating Cybersecurity Scores and Residual Cyber Risk Scores'
Part VII: GDPR and Privacy. 25. 'GDPR Overview' 26. 'GDPR Articles' 27. 'GDRP Evidence' 28. 'GDPR Privacy Impact Assessment (PIA)' Part VIII: Cybersecurity Risk Management Strategy. 29. 'CISO Strategies' 30. 'Cyber in the Board Room' Part IX: Cybersecurity Insurance. 31. 'Cyber Insurance Overview' 32. 'Calculating Limits Adequacy' 33. 'Ransomware Strategies' Part X: Introduction to Cybersecurity Vendor Risk Management. 34. 'Vendor Risk Overview' 35. 'Vendor Cybersecurity Regulations'
15. 'U.S. Federal Regulations' 16. 'U.S. State Regulations' 17. 'New York State Department of Financial Services Part 500' 18. 'Global, Industry or Other Types of Cybersecurity Regulations' Part V: Incident Response, Forensics and Audit. 19. 'Incident Response Plans' 20. 'Forensic Methods' 21. 'IT Audit'
Part VI: Cybersecurity Risk Management. 22. 'Cybersecurity Financial Exposures' 23. 'Digital Asset Cyber Risk Modeling and Scoring' 24. 'Mitigating Cybersecurity Scores and Residual Cyber Risk Scores'
Part VII: GDPR and Privacy. 25. 'GDPR Overview' 26. 'GDPR Articles' 27. 'GDRP Evidence' 28. 'GDPR Privacy Impact Assessment (PIA)' Part VIII: Cybersecurity Risk Management Strategy. 29. 'CISO Strategies' 30. 'Cyber in the Board Room' Part IX: Cybersecurity Insurance. 31. 'Cyber Insurance Overview' 32. 'Calculating Limits Adequacy' 33. 'Ransomware Strategies' Part X: Introduction to Cybersecurity Vendor Risk Management. 34. 'Vendor Risk Overview' 35. 'Vendor Cybersecurity Regulations'
Part I: The Evolution of Cybersecurity. 1. Cyber - A business Issue 2. 'Cyber Risk' 3. 'The History of Cybersecurity' 4. 'Cyber Consequences' 5. 'Cyber Trends and Spending' 6. 'Cyber Roles' Part II: Cybersecurity Basics. 7. 'Cyber -Attack Surfaces and Digital Asset Inventories' 8. 'Cyber Terminology and Statistics' 9. 'Enterprise Threats of Today and Cybercriminals' 10. 'Cybersecurity Regulations, Standards and Frameworks' 11. 'Enterprise Cybersecurity Programs' 12. 'Organizational Cyber Maturities' Part III: Cybersecurity Tools. 13. 'Cyber Policies' 14. 'Cybersecurity Tools Part IV: Cybersecurity Regulation.
15. 'U.S. Federal Regulations' 16. 'U.S. State Regulations' 17. 'New York State Department of Financial Services Part 500' 18. 'Global, Industry or Other Types of Cybersecurity Regulations' Part V: Incident Response, Forensics and Audit. 19. 'Incident Response Plans' 20. 'Forensic Methods' 21. 'IT Audit'
Part VI: Cybersecurity Risk Management. 22. 'Cybersecurity Financial Exposures' 23. 'Digital Asset Cyber Risk Modeling and Scoring' 24. 'Mitigating Cybersecurity Scores and Residual Cyber Risk Scores'
Part VII: GDPR and Privacy. 25. 'GDPR Overview' 26. 'GDPR Articles' 27. 'GDRP Evidence' 28. 'GDPR Privacy Impact Assessment (PIA)' Part VIII: Cybersecurity Risk Management Strategy. 29. 'CISO Strategies' 30. 'Cyber in the Board Room' Part IX: Cybersecurity Insurance. 31. 'Cyber Insurance Overview' 32. 'Calculating Limits Adequacy' 33. 'Ransomware Strategies' Part X: Introduction to Cybersecurity Vendor Risk Management. 34. 'Vendor Risk Overview' 35. 'Vendor Cybersecurity Regulations'
15. 'U.S. Federal Regulations' 16. 'U.S. State Regulations' 17. 'New York State Department of Financial Services Part 500' 18. 'Global, Industry or Other Types of Cybersecurity Regulations' Part V: Incident Response, Forensics and Audit. 19. 'Incident Response Plans' 20. 'Forensic Methods' 21. 'IT Audit'
Part VI: Cybersecurity Risk Management. 22. 'Cybersecurity Financial Exposures' 23. 'Digital Asset Cyber Risk Modeling and Scoring' 24. 'Mitigating Cybersecurity Scores and Residual Cyber Risk Scores'
Part VII: GDPR and Privacy. 25. 'GDPR Overview' 26. 'GDPR Articles' 27. 'GDRP Evidence' 28. 'GDPR Privacy Impact Assessment (PIA)' Part VIII: Cybersecurity Risk Management Strategy. 29. 'CISO Strategies' 30. 'Cyber in the Board Room' Part IX: Cybersecurity Insurance. 31. 'Cyber Insurance Overview' 32. 'Calculating Limits Adequacy' 33. 'Ransomware Strategies' Part X: Introduction to Cybersecurity Vendor Risk Management. 34. 'Vendor Risk Overview' 35. 'Vendor Cybersecurity Regulations'