Confronting Cyber Risk
-10%
portes grátis
Confronting Cyber Risk
An Embedded Endurance Strategy for Cybersecurity
Falco, Gregory J.; Rosenbach, Eric
Oxford University Press Inc
05/2022
224
Mole
Inglês
9780197526545
15 a 20 dias
260
Descrição não disponível.
Preface
Chapter 1: Why Is Cyber Risk an Issue?
Chapter 2: Who Is Attacking Us?
Chapter 3: How Do I Assess Our Cyber Risk?
Chapter 4: What Do I Need to Know About Cyber Frameworks, Standards, and Laws?
Chapter 5: Who Is Responsible for Cybersecurity?
Chapter 6: What Risk Prevention Measures Can I Use?
Chapter 7: What Risk Resilience Measures Can I Use?
Chapter 8: How Do I Embed Cyber Risk Management in All Aspects of the Organization?
Conclusion
Chapter 1: Why Is Cyber Risk an Issue?
Chapter 2: Who Is Attacking Us?
Chapter 3: How Do I Assess Our Cyber Risk?
Chapter 4: What Do I Need to Know About Cyber Frameworks, Standards, and Laws?
Chapter 5: Who Is Responsible for Cybersecurity?
Chapter 6: What Risk Prevention Measures Can I Use?
Chapter 7: What Risk Resilience Measures Can I Use?
Chapter 8: How Do I Embed Cyber Risk Management in All Aspects of the Organization?
Conclusion
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Preface
Chapter 1: Why Is Cyber Risk an Issue?
Chapter 2: Who Is Attacking Us?
Chapter 3: How Do I Assess Our Cyber Risk?
Chapter 4: What Do I Need to Know About Cyber Frameworks, Standards, and Laws?
Chapter 5: Who Is Responsible for Cybersecurity?
Chapter 6: What Risk Prevention Measures Can I Use?
Chapter 7: What Risk Resilience Measures Can I Use?
Chapter 8: How Do I Embed Cyber Risk Management in All Aspects of the Organization?
Conclusion
Chapter 1: Why Is Cyber Risk an Issue?
Chapter 2: Who Is Attacking Us?
Chapter 3: How Do I Assess Our Cyber Risk?
Chapter 4: What Do I Need to Know About Cyber Frameworks, Standards, and Laws?
Chapter 5: Who Is Responsible for Cybersecurity?
Chapter 6: What Risk Prevention Measures Can I Use?
Chapter 7: What Risk Resilience Measures Can I Use?
Chapter 8: How Do I Embed Cyber Risk Management in All Aspects of the Organization?
Conclusion
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.