Buy Stepping Through Cybersecurity Risk Management by Jennifer L. Bayuk
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology > Computer security > Computer viruses, Trojans and worms > Stepping Through Cybersecurity Risk Management: A Systems Thinking Approach
Stepping Through Cybersecurity Risk Management: A Systems Thinking Approach

Stepping Through Cybersecurity Risk Management: A Systems Thinking Approach


     0     
5
4
3
2
1



International Edition


X
About the Book

Stepping Through Cybersecurity Risk Management Authoritative resource delivering the professional practice of cybersecurity from the perspective of enterprise governance and risk management. Stepping Through Cybersecurity Risk Management covers the professional practice of cybersecurity from the perspective of enterprise governance and risk management. It describes the state of the art in cybersecurity risk identification, classification, measurement, remediation, monitoring and reporting. It includes industry standard techniques for examining cybersecurity threat actors, cybersecurity attacks in the context of cybersecurity-related events, technology controls, cybersecurity measures and metrics, cybersecurity issue tracking and analysis, and risk and control assessments. The text provides precise definitions for information relevant to cybersecurity management decisions and recommendations for collecting and consolidating that information in the service of enterprise risk management. The objective is to enable the reader to recognize, understand, and apply risk-relevant information to the analysis, evaluation, and mitigation of cybersecurity risk. A well-rounded resource, the text describes both reports and studies that improve cybersecurity decision support. Composed of 10 chapters, the author provides learning objectives, exercises and quiz questions per chapter in an appendix, with quiz answers and exercise grading criteria available to professors. Written by a highly qualified professional with significant experience in the field, Stepping Through Cybersecurity Risk Management includes information on: Threat actors and networks, attack vectors, event sources, security operations, and CISO risk evaluation criteria with respect to this activity Control process, policy, standard, procedures, automation, and guidelines, along with risk and control self assessment and compliance with regulatory standards Cybersecurity measures and metrics, and corresponding key risk indicators The role of humans in security, including the “three lines of defense” approach, auditing, and overall human risk management Risk appetite, tolerance, and categories, and analysis of alternative security approaches via reports and studies Providing comprehensive coverage on the topic of cybersecurity through the unique lens of perspective of enterprise governance and risk management, Stepping Through Cybersecurity Risk Management is an essential resource for professionals engaged in compliance with diverse business risk appetites, as well as regulatory requirements such as FFIEC, HIIPAA, and GDPR, as well as a comprehensive primer for those new to the field. A complimentary forward by Professor Gene Spafford explains why “This book will be helpful to the newcomer as well as to the hierophants in the C-suite. The newcomer can read this to understand general principles and terms. The C-suite occupants can use the material as a guide to check that their understanding encompasses all it should.”

Table of Contents:
Foreword ix Preface xiii Acknowledgements xxv About the Companion Website xxvii 1 Framework Elements 1 References 16 2 Threats 17 2.1 Threat Actors 17 2.1.1 Hackivists 22 2.1.2 Insiders 23 2.1.3 Hacker 26 2.1.4 Competitors 29 2.1.5 Lone Wolf 33 2.2 Threat Networks 33 2.2.1 Example: Identity Theft 34 2.2.2 Zero-Day Threats 35 2.3 Threat Vectors 37 References 44 3 Events 47 3.1 Event Classification 50 3.2 Event Prevention 56 3.3 Detection and Response 65 3.4 Event Scenarios 77 References 87 4 Controls 89 4.1 Risk Appetite 91 4.2 Policy 94 4.2.1 Security Principles 96 4.2.2 Formality 102 4.3 Process 106 4.4 Standards 114 4.4.1 Internal Standards 114 4.4.2 External Standards 116 4.4.3 Security Architecture 123 4.5 Procedures 130 4.6 Guidelines 136 References 140 5 Assessments 143 5.1 Standards Adherence 147 5.2 Risk and Control Self Assessment 154 5.3 Pentests and Vulnscans 160 5.4 Audits 165 5.5 Spot Checks 169 References 172 6 Issues 173 6.1 Issue Identification 174 6.2 Classification 177 6.3 Criteria and Remediation 180 References 183 7 Metrics 185 7.1 Measuring Cybersecurity 186 7.2 From Measures to Metrics 189 7.3 Key Risk Indicators 205 References 216 8 People 217 8.1 Three Lines of Defense 217 8.2 The Cybersecurity Team 224 8.3 Enterprise Management 230 8.4 Framework Element Owners 233 References 235 9 Risks 237 9.1 Risk Categories 239 9.2 Risk Treatment 242 9.2.1 Controls 242 9.2.2 Transfer 242 9.2.3 Avoidance 245 9.2.4 Acceptance 245 9.3 Risk Appetite 250 9.4 Risk Tolerance 255 9.5 Probability Measurement 260 References 266 10 Analysis 269 10.1 Reports and Studies 269 10.2 Safety Analogies 275 10.3 Decision Support 278 10.4 Conclusion 280 References 282 Appendix: Exercises in FrameCyber 283 Index 299

About the Author :
Jennifer L. Bayuk is a cybersecurity due diligence expert with a MS in Computer Science and a PhD in Systems Engineering. She has been a Global Financial Services Technology Risk Management Officer, a Wall Street Chief Information Security Officer, a Big 4 Information Risk Management Consultant, a Manager of Information Technology Internal Audit, a Security Architect, a Bell Labs Security Software Engineer, a Professor of Systems Security Engineering, and a Private Cybersecurity Investigator and Expert Witness

Review :
"Stepping Through Cybersecurity Risk Management: A Systems Thinking Approach" by Jennifer L. Bayuk. FIVE STARS (or whatever the highest rating is) I have to admit that I usually don't get excited when a new cybersecurity book comes out, but this one was different. First, the focus is extremely important in today's environment: a systems thinking approach. The importance of this topic cannot be overstated. In an era where cyber threats are becoming increasingly sophisticated, a systems thinking approach provides the necessary framework to build resilient and robust security measures. Bayuk’s ability to distill complex concepts into practical advice makes this book not only intriguing but also incredibly valuable for cybersecurity professionals at all levels. As a cybersecurity consultant for over 25 years, a lack of systems thinking is, perhaps, one of the most prevalent reasons for the host of breaches and incidents we are seeing. But most importantly, the author's credibility is what led me to rush to get a copy. Jennifer L. Bayuk is an esteemed professional in cybersecurity with a wealth of experience as an academic, consultant, and industry executive. She is extremely well-known in this space, especially in the Metro-NY area, so when Dr. Bayuk writes a book on cybersecurity, it behooves professionals in this space to read it. As such, "Stepping Through Cybersecurity Risk Management: A Systems Thinking Approach" is a must-read for anyone serious about understanding the intricacies of cybersecurity and how to deploy cybersecurity principles. The book reads like a graduate school textbook on the topic, with each chapter delving into various topics, such as threats, controls, assessments, risks, etc. I found this format quite useful and used it as a reference guide, where I can quickly jump to the chapter covering the topic of interest. For example, I was preparing for a client meeting to discuss Risk Appetite and used some of her examples to discuss the topic with the company executives better. In another situation, trying to help a younger teammate understand the concept and value of Risk and Controls Self-Assessment (RCSA), I lent him the book, and he quickly brought himself up to speed. Ultimately, this book does more than highlight the challenges and risks of cybersecurity; it provides a roadmap for navigating these challenges. A cybersecurity program built around the systems thinking principles outlined in this book would surely be one a company could confidently invest in. Further, her authoritative voice and clear, insightful guidance make this book an essential addition to the library of anyone involved in the cybersecurity field. Review done by Jim Ambrosini


Best Sellers


Product Details
  • ISBN-13: 9781394213955
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: John Wiley & Sons Inc
  • Language: English
  • Returnable: N
  • Sub Title: A Systems Thinking Approach
  • ISBN-10: 1394213956
  • Publisher Date: 05 Mar 2024
  • Binding: Hardback
  • No of Pages: 336
  • Returnable: N
  • Weight: 784 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Stepping Through Cybersecurity Risk Management: A Systems Thinking Approach
John Wiley & Sons Inc -
Stepping Through Cybersecurity Risk Management: A Systems Thinking Approach
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Stepping Through Cybersecurity Risk Management: A Systems Thinking Approach

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    Fresh on the Shelf


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!