Hodson, Christopher,

CYBER RISK MANAGEMENT : Prioritize threats, identify vulnerabilities and apply controls / Christopher J Hodson. - 1st Edition - ix, 394 pages : illustrations. 24 cm

Section - ONE: Contextualizing cybersecurity risk;Chapter - 01: Why now? The only constant is change;Chapter - 02: Technologies and security challenges;Chapter - 03: Data breaches;Section - TWO: Cybersecurity programme management;Chapter - 04: What are cybersecurity and cybercrime?;Chapter - 05: Establishing a cybersecurity programme;Section - THREE: Actors, events and vulnerabilities;Chapter - 06: Threat actors;Chapter - 07: Threat events;Chapter - 08: Vulnerabilities;Chapter - 09: Controls;Section - FOUR: Conclusion - The cybersecurity risk equation explained;Chapter - 10: Cyber risk management - A conclusion

Learn how to prioritize threats, implement a cyber security programme and effectively communicate risks.

9780749498788 (hardback) : RM189.99 9780749484125 (pbk.) :

GBB960843 bnb

019345655 Uk


Computer networks--Security measures.
Risk management.

005.8