Volume V Cybersecurity Risk Management
-
Edited by:
and
About this book
Cybersecurity refers to the set of technologies, practices, and strategies designed to protect computer systems, networks, devices, and data from unauthorized access, theft, damage, disruption, or misuse. It involves identifying and assessing potential threats and vulnerabilities, and implementing controls and countermeasures to prevent or mitigate them. Some major risks of a successful cyberattack include: data breaches, ransomware attacks, disruption of services, damage to infrastructure, espionage and sabotage.
Cybersecurity Risk Management: Enhancing Leadership and Expertise explores this highly dynamic field that is situated in a fascinating juxtaposition with an extremely advanced and capable set of cyber threat adversaries, rapidly evolving technologies, global digitalization, complex international rules and regulations, geo-politics, and even warfare. A successful cyber-attack can have significant consequences for individuals, organizations, and society as a whole.
With comprehensive chapters in the first part of the book covering fundamental concepts and approaches, and those in the second illustrating applications of these fundamental principles, Cybersecurity Risk Management: Enhancing Leadership and Expertise makes an important contribution to the literature in the field by proposing an appropriate basis for managing cybersecurity risk to overcome practical challenges.
- Authored by a unique collection of scientists, academics, and practitioners with decades of practical cyber risk expertise.
- Provides a focus on situations with potential for substantial reward but also with the possibility of extreme consequences.
Author / Editor information
Dr. Kurt Engemann is the Director of the Center for Business Continuity and Risk Management and a Professor of Information Systems and Business Analytics in the LaPenta School of Business at Iona University, USA. He is the Editor-in-Chief of the multi-volume book set, Developments in Managing and Exploiting Risk, and two journals, the International Journal of Business Continuity and Risk Management and the International Journal of Technology, Policy and Management. He has consulted professionally in the area of risk modeling for major organizations and has been instrumental in the development of comprehensive business continuity management programs.
Jason Witty is Chief Security Officer at USAA, managing all technology, cyber, physical, executive protection, privacy, and business continuity risks. He is an award-winning Certified Information Systems Security Management Professional (ISSMP) with more than 30 years of experience in the field. Prior to USAA he was the Global Chief Information Security Officer at both J.P.Morgan Chase and U.S. Bank. He also served in industry leadership roles including serving as Vice-Chair of the National Technology Security Coalition (NTSC); Chair of the Financial Services and Information Sharing and Analysis Center (FS-ISAC) and Sector Chief for Financial Services in FBI Chicago’s Infragard program.
Reviews
"Cybersecurity Risk Management: Enhancing Leadership and Expertise" is a must-read for cybersecurity professionals looking to elevate their game. It offers a solid blend of practical advice and leadership strategies, bridging the gap between technical and executive perspectives. If you're serious about safeguarding your organization’s digital wealth, this book is excellent—great value and well worth your time."
Llewellyn G. Thorne
Topics
-
Download PDFPublicly Available
Frontmatter
I -
Download PDFPublicly Available
Advances in cybersecurity risk management
V -
Download PDFPublicly Available
Contents
XIII - Part I: Fundamentals
-
Download PDFRequires Authentication UnlicensedLicensed
1 Introduction to and brief history of cybersecurity risk management
1 -
Download PDFRequires Authentication UnlicensedLicensed
2 Hierarchical considerations in cyber risk assessments: Strategic versus operational prioritization in managing current and emergent threats
27 -
Download PDFRequires Authentication UnlicensedLicensed
3 The benefits of human factors engineering in cybersecurity
53 -
Download PDFRequires Authentication UnlicensedLicensed
4 An organizational climate primer for the development of cybersecurity socio-organizational frameworks
85 -
Download PDFRequires Authentication UnlicensedLicensed
5 Transparent and inclusive cybersecurity risk management and governance
99 -
Download PDFRequires Authentication UnlicensedLicensed
6 Securing artificial intelligence in the real world
113 - Part II: Applications
-
Download PDFRequires Authentication UnlicensedLicensed
7 The CISO evolution and impact on goals, processes, and priorities
125 -
Download PDFRequires Authentication UnlicensedLicensed
8 Towards a more secure IT driven future: The necessity and promise of IT operations management governance
143 -
Download PDFRequires Authentication UnlicensedLicensed
9 Practical cyber risk management – preventing the predictable: Drivers of decision making under risk
159 -
Download PDFRequires Authentication UnlicensedLicensed
10 Implications of artificial intelligence in cybersecurity for individuals
189 -
Download PDFRequires Authentication UnlicensedLicensed
11 Ensuring transportation cybersecurity: Air, auto, and rail
213 -
Download PDFRequires Authentication UnlicensedLicensed
12 Towards robust policy frameworks for securing cyber-physical systems in healthcare
231 -
Download PDFRequires Authentication UnlicensedLicensed
Contributors
253 -
Download PDFRequires Authentication UnlicensedLicensed
Index
255 -
Download PDFRequires Authentication UnlicensedLicensed
Developments in managing and exploiting risk
259
-
Manufacturer information:
Walter de Gruyter GmbH
Genthiner Straße 13
10785 Berlin
productsafety@degruyterbrill.com