Read more
Optimal Spending on Cybersecurity Measures: Third Party Risk Management introduces the cyber risk investment model, and the cybersecurity risk management framework used within business-driven risk assessments to address government regulations, industry standards and applicable Laws.
List of contents
Preface About the Author Chapter 1: Introduction Chapter 2: Privacy Laws Chapter 3: Data Protection Chapter 4: Third Party Risk Management Chapter 5: Technology and Cyber Risk Chapter 6: Governance Chapter 7: Cybersecurity Risk Management Framework Chapter 8: Case Study #1: Chime Live Chapter 9: Case Study #2 - Alumni Learning Consortium Chapter 10: Case Study #3 - Marketing Automation Tool
About the author
Sherita-Tara (Tara) Kissoon, MSc, MBA, CISSP, CISA, is a multi-certified I.T. Risk & Security Leader with twenty-five years of technology experience, twenty years of experience in the financial services industry focusing on technology, cybersecurity, governance, risk and compliance, along with professional and community volunteering. Tare actively volunteering at ISACA, ISC2, University of London and St. Patrick's Parish in Markham, and have attained my Enhanced Police Information Check (E-PIC), Vulnerable Sector Check, NEXUS, Biometrics, Bail Verification and maintain medical records for identity verification, to volunteer/work in high-risk communities, and cross borders as a trusted traveler.
Tara Kissoon is a multi-certified I.T. Risk & Security Leader with 25+ years of technology experience, 20 years of executive experience in the financial services industry. She brings continued success on leading Technology, I.T. Risk and Information Security projects and programs within large organizations. She is acknowledged as a leader and trusted advisor with a talent for effective resource management, steering traditional and diverse cross-functional staff to achieve short and long-term business objectives. Relevant Publication include (ORCID: 0000-0001-6903-1938) - 1) Book (2024): Routledge (Taylor & Francis) Optimal Spending on Cybersecurity Measures: Protecting Health Information 2) Book (2024): Routledge (Taylor & Francis) Optimal Spending on Cybersecurity Measures: Digital Privacy and Data Protection 3) Book (2024): Routledge (Taylor & Francis) Optimal Spending on Cybersecurity Measures: DevOps, 4) Book (2022): Routledge (Taylor & Francis) Optimal Spending on Cybersecurity Measures: Risk Management, 5) Article (2021): Journal of Information Security (Vol.12 No.1, Jan 2021) - Optimum Spending on Cybersecurity Measures Part II, 6) Article (2020): Emerald Publishing Limited - Optimum Spending on Cybersecurity Measures, 7) ISACA TIPs column (2012 - 2014), and 8) ISACA Online Journal (2008): Strengthening Access using Smart Cards. CV is enclosed.