Skip to main content
book: Volume V Cybersecurity Risk Management
Book
Licensed
Unlicensed Requires Authentication

Volume V Cybersecurity Risk Management

Enhancing Leadership and Expertise
  • Edited by: and
Part of the multi-volume work
Developments in Managing and Exploiting Risk
Language: English
Published/Copyright: 2024
Become an author with De Gruyter Brill

About this book

Cybersecurity refers to the set of technologies, practices, and strategies designed to protect computer systems, networks, devices, and data from unauthorized access, theft, damage, disruption, or misuse. It involves identifying and assessing potential threats and vulnerabilities, and implementing controls and countermeasures to prevent or mitigate them. Some major risks of a successful cyberattack include: data breaches, ransomware attacks, disruption of services, damage to infrastructure, espionage and sabotage.

Cybersecurity Risk Management: Enhancing Leadership and Expertise explores this highly dynamic field that is situated in a fascinating juxtaposition with an extremely advanced and capable set of cyber threat adversaries, rapidly evolving technologies, global digitalization, complex international rules and regulations, geo-politics, and even warfare. A successful cyber-attack can have significant consequences for individuals, organizations, and society as a whole.

With comprehensive chapters in the first part of the book covering fundamental concepts and approaches, and those in the second illustrating applications of these fundamental principles, Cybersecurity Risk Management: Enhancing Leadership and Expertise makes an important contribution to the literature in the field by proposing an appropriate basis for managing cybersecurity risk to overcome practical challenges.

  • Authored by a unique collection of scientists, academics, and practitioners with decades of practical cyber risk expertise.
  • Provides a focus on situations with potential for substantial reward but also with the possibility of extreme consequences.

Author / Editor information

Dr. Kurt Engemann is the Director of the Center for Business Continuity and Risk Management and a Professor of Information Systems and Business Analytics in the LaPenta School of Business at Iona University, USA. He is the Editor-in-Chief of the multi-volume book set, Developments in Managing and Exploiting Risk, and two journals, the International Journal of Business Continuity and Risk Management and the International Journal of Technology, Policy and Management. He has consulted professionally in the area of risk modeling for major organizations and has been instrumental in the development of comprehensive business continuity management programs.

Jason Witty is Chief Security Officer at USAA, managing all technology, cyber, physical, executive protection, privacy, and business continuity risks. He is an award-winning Certified Information Systems Security Management Professional (ISSMP) with more than 30 years of experience in the field. Prior to USAA he was the Global Chief Information Security Officer at both J.P.Morgan Chase and U.S. Bank. He also served in industry leadership roles including serving as Vice-Chair of the National Technology Security Coalition (NTSC); Chair of the Financial Services and Information Sharing and Analysis Center (FS-ISAC) and Sector Chief for Financial Services in FBI Chicago’s Infragard program.

Reviews

"Cybersecurity Risk Management: Enhancing Leadership and Expertise" is a must-read for cybersecurity professionals looking to elevate their game. It offers a solid blend of practical advice and leadership strategies, bridging the gap between technical and executive perspectives. If you're serious about safeguarding your organization’s digital wealth, this book is excellent—great value and well worth your time."
Llewellyn G. Thorne

  • Publicly Available
    Download PDF
  • Publicly Available
    Download PDF
  • Publicly Available
    Download PDF
  • Part I: Fundamentals
  • Requires Authentication Unlicensed
    Licensed
    Download PDF
  • Requires Authentication Unlicensed
    Licensed
    Download PDF
  • Requires Authentication Unlicensed
    Licensed
    Download PDF
  • Requires Authentication Unlicensed
    Licensed
    Download PDF
  • Requires Authentication Unlicensed
    Licensed
    Download PDF
  • Requires Authentication Unlicensed
    Licensed
    Download PDF
  • Part II: Applications
  • Requires Authentication Unlicensed
    Licensed
    Download PDF
  • Requires Authentication Unlicensed
    Licensed
    Download PDF
  • Requires Authentication Unlicensed
    Licensed
    Download PDF
  • Requires Authentication Unlicensed
    Licensed
    Download PDF
  • Requires Authentication Unlicensed
    Licensed
    Download PDF
  • Requires Authentication Unlicensed
    Licensed
    Download PDF
  • Requires Authentication Unlicensed
    Licensed
    Download PDF
  • Requires Authentication Unlicensed
    Licensed
    Download PDF
  • Requires Authentication Unlicensed
    Licensed
    Download PDF

Publishing information
Pages and Images/Illustrations in book
eBook published on:
August 19, 2024
eBook ISBN:
9783111289069
Hardcover published on:
August 19, 2024
Hardcover ISBN:
9783111286013
Pages and Images/Illustrations in book
Front matter:
14
Main content:
257
Illustrations:
23
Tables:
3
Downloaded on 17.4.2026 from https://www.degruyterbrill.com/document/doi/10.1515/9783111289069/html
Scroll to top button