Cyber Intelligence-Driven Risk

Cyber Intelligence-Driven Risk
Автор книги: id книги: 1877892     Оценка: 0.0     Голосов: 0     Отзывы, комментарии: 0 3624,13 руб.     (35,33$) Читать книгу Купить и скачать книгу Купить бумажную книгу Электронная книга Жанр: Зарубежная деловая литература Правообладатель и/или издательство: John Wiley & Sons Limited Дата добавления в каталог КнигаЛит: ISBN: 9781119676898 Скачать фрагмент в формате   fb2   fb2.zip Возрастное ограничение: 0+ Оглавление Отрывок из книги

Реклама. ООО «ЛитРес», ИНН: 7719571260.

Описание книги

Turn cyber intelligence into meaningful business decisions and reduce losses from cyber events Cyber Intelligence-Driven Risk provides a solution to one of the most pressing issues that executives and risk managers face: How can we weave information security into our business decisions to minimize overall business risk? In today's complex digital landscape, business decisions and cyber event responses have implications for information security that high-level actors may be unable to foresee. What we need is a cybersecurity command center capable of delivering, not just data, but concise, meaningful interpretations that allow us to make informed decisions. Building, buying, or outsourcing a CI-DR™ program is the answer. In his work with executives at leading financial organizations and with the U.S. military, author Richard O. Moore III has tested and proven this next-level approach to Intelligence and Risk. This book is a guide to: Building, buying, or outsourcing a cyber intelligence–driven risk program Understanding the functional capabilities needed to sustain the program Using cyber intelligence to support Enterprise Risk Management Reducing loss from cyber events by building new organizational capacities Supporting mergers and acquisitions with predictive analytics Each function of a well-designed cyber intelligence-driven risk program can support informed business decisions in the era of increased complexity and emergent cyber threats.

Оглавление

Richard O. Moore III. Cyber Intelligence-Driven Risk

Table of Contents

List of Illustrations

Guide

Pages

Cyber Intelligence-Driven Risk. How to Build and Use Cyber Intelligence for Business Risk Decisions

Preface

NOTES

Acknowledgments

Introduction

NOTES

NOTES

CHAPTER 1 Objectives of a Cyber Intelligence-Driven Risk Program

NOTES

NOTES

CHAPTER 2 Importance of Cyber Intelligence for Businesses

NOTES

NOTES

CHAPTER 3 Military to Commercial Viability of the CI-DR™ Program

NOTES

NOTES

CHAPTER 4 CI-DR™ Security Program Components

NOTES

NOTE

CHAPTER 5 Functional Capabilities of the CI-DRTM Program

NOTES

NOTES

CHAPTER 6 CI-DR™ Key Capability Next-Generation Security Operations Center

Introduction by Kiran Vangaveti – CEO of BluSapphire

NOTES

NOTES

CHAPTER 7 CI-DR™ Key Capability Cyber Threat Intelligence

NOTES

NOTES

CHAPTER 8 CI-DR™ Key Capability Forensic Teams

NOTES

CHAPTER 9 CI-DR™ Key Capability Vulnerability Management Teams

NOTES

NOTES

CHAPTER 10 CI-DR™ Key Capability Incident Response Teams

NOTES

CHAPTER 11 CI-DR™ Collection Components

NOTES

NOTE

CHAPTER 12 CI-DR™ Stakeholders

NOTES

Conclusion

Glossary

NOTE

About the Author and Chapter Authors. RICHARD O. MOORE III, MSIA, CISSP, CISM, AUTHOR AND EDITOR

STEVEN JOHNSON, DSC, CISM, CISSP, CCE #1463

DEREK OLSON, CISSP, CISM

STEVEN M DUFOUR, ISO LEADER AUDITOR, CERTIFIED QUALITY MANAGER

Index

WILEY END USER LICENSE AGREEMENT

Отрывок из книги

RICHARD O. MOORE III, MSIA, CISSP, CISM

– Carl von Clausewitz

.....

Every industry can benefit by creating or enhancing their business risk management program. Our CI-DR framework provides you, the reader, with the opportunity to build these capabilities, whether internally built, acquired through merger or acquisition, or sourced from the many service providers; this handbook provides the tools and the framework needed to ensure that it is effective. By the end of this book, the reader should understand what functional capabilities are needed to build a CI-DR program; the importance of why the “connective tissue” between the functions and capabilities is so valuable, and how the CI-DR program can be adequately leveraged to assist leaders in making more informed business decisions in the era of increased emergent cyber threats and attacks. Depending on the level of business understanding, the reader will be able to:

If this book inspires you to create new technologies, build a company to support these capabilities, or reduce risk and costs to your organization, please drop us a note on social media (@cybersixactual) or send us an email (https://www.cybersix.com), we would love to hear from you.

.....

Добавление нового отзыва

Комментарий Поле, отмеченное звёздочкой  — обязательно к заполнению

Отзывы и комментарии читателей

Нет рецензий. Будьте первым, кто напишет рецензию на книгу Cyber Intelligence-Driven Risk
Подняться наверх