TY - BOOK AU - Hodson,Christopher TI - CYBER RISK MANAGEMENT: Prioritize threats, identify vulnerabilities and apply controls SN - 9780749498788 (hardback) : U1 - 005.8 23 PY - 2019/// CY - London PB - KoganPage KW - Computer networks KW - Security measures KW - Risk management N1 - Section - ONE: Contextualizing cybersecurity risk;Chapter - 01: Why now? The only constant is change;Chapter - 02: Technologies and security challenges;Chapter - 03: Data breaches;Section - TWO: Cybersecurity programme management;Chapter - 04: What are cybersecurity and cybercrime?;Chapter - 05: Establishing a cybersecurity programme;Section - THREE: Actors, events and vulnerabilities;Chapter - 06: Threat actors;Chapter - 07: Threat events;Chapter - 08: Vulnerabilities;Chapter - 09: Controls;Section - FOUR: Conclusion - The cybersecurity risk equation explained;Chapter - 10: Cyber risk management - A conclusion N2 - Learn how to prioritize threats, implement a cyber security programme and effectively communicate risks ER -