Jump to ratings and reviews
Rate this book

Cyber Risk Management: Prioritize Threats, Identify Vulnerabilities and Apply Controls

Rate this book
Most organizations are undergoing a digital transformation of some sort and are looking to embrace innovative technology, but new ways of doing business inevitably lead to new threats which can cause irreparable financial, operational and reputational damage.

In an increasingly punitive regulatory climate, organizations are also under pressure to be more accountable and compliant. Cyber Risk Management clearly explains the importance of implementing a cyber security strategy and provides practical guidance for those responsible for managing threat events, vulnerabilities and controls, including malware, data leakage, insider threat and Denial-of-Service.

Examples and use cases including Yahoo, Facebook and TalkTalk, add context throughout and emphasize the importance of communicating security and risk effectively, while implementation review checklists bring together key points at the end of each chapter. Cyber Risk Management analyzes the innate human factors around risk and how they affect cyber awareness and employee training, along with the need to assess the risks posed by third parties. Including an introduction to threat modelling, this book presents a data-centric approach to cyber risk management based on business impact assessments, data classification, data flow modelling and assessing return on investment. It covers pressing developments in artificial intelligence, machine learning, big data and cloud mobility, and includes advice on responding to risks which are applicable for the environment and not just based on media sensationalism.

280 pages, Hardcover

Published June 25, 2019

5 people are currently reading
15 people want to read

About the author

Christopher Hodson

13 books3 followers

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
3 (60%)
4 stars
1 (20%)
3 stars
0 (0%)
2 stars
1 (20%)
1 star
0 (0%)
Displaying 1 of 1 review
Profile Image for Kerry Pickens.
1,182 reviews31 followers
June 21, 2019
I work in IT security, so I am probably more critical of this book than the average reader -- but I felt like I was playing business bingo. There are so many buzzwords in the text that it takes away from the value of the content. Most of the information is general knowledge that is available to the public. I didn't learn anything new nor would I recommend this book to anyone wanting to learn more about cybersecurity unless they were a complete novice.
Displaying 1 of 1 review

Can't find what you're looking for?

Get help and learn more about the design.