Fr. 75.00

Cyber Risk Management - Prioritize Threats, Identify Vulnerabilities and Apply Controls

English · Paperback / Softback

Shipping usually within 4 to 7 working days

Description

Read more

List of contents










Section - PART ONE: Contextualizing cybersecurity risk; Chapter - 01: Why now? The only constant is change; Chapter - 02: Technologies and security challenges; Chapter - 03: Data breaches; Section - PART TWO: Cybersecurity programme management; Chapter - 04: What are cybersecurity and cybercrime?; Chapter - 05: Establishing a cybersecurity programme; Section - PART THREE: Actors, events and vulnerabilities; Chapter - 06: Threat actors; Chapter - 07: Threat events; Chapter - 08: Vulnerabilities; Chapter - 09: Controls; Section - PART FOUR: Conclusion: the cybersecurity risk equation explained; Chapter - 10: Cyber risk management: a conclusion;

About the author

Christopher J Hodson is Chief Security Officer for Cyberhaven where he oversees all facets of security to protect Cyberhaven customers and employees, including cloud and application security, security operations, and risk management. In addition, Chris serves as a board advisor at the workforce development platform, Cybrary, and is a fellow of the Chartered Institute of Information Security. He has previously held CISO positions with Contentful, Zscaler, and Tanium. He is a guest lecturer at Royal Holloway, University of London where he also holds a master's degree in computer and information systems security.

Summary

Learn how to prioritize threats, implement a cyber security programme and effectively communicate risks.

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.