語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Enterprise cyber risk management as ...
~
Chaput, Bob.
Enterprise cyber risk management as a value creatorleverage cybersecurity for competitive advantage /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Enterprise cyber risk management as a value creatorby Bob Chaput ; foreword by Phil Gardner, CEO, IANS Research.
其他題名:
leverage cybersecurity for competitive advantage /
作者:
Chaput, Bob.
其他作者:
Gardner, Phil.
出版者:
Berkeley, CA :Apress :2024.
面頁冊數:
xliii, 388 p. :ill., digital ;24 cm.
Contained By:
Springer Nature eBook
標題:
Computer securityManagement.
電子資源:
https://doi.org/10.1007/979-8-8688-0094-8
ISBN:
9798868800948$q(electronic bk.)
Enterprise cyber risk management as a value creatorleverage cybersecurity for competitive advantage /
Chaput, Bob.
Enterprise cyber risk management as a value creator
leverage cybersecurity for competitive advantage /[electronic resource] :by Bob Chaput ; foreword by Phil Gardner, CEO, IANS Research. - Berkeley, CA :Apress :2024. - xliii, 388 p. :ill., digital ;24 cm.
Part I: A Case for Action -- Chapter 1: Enterprise Cyber Risk Management as a Value Creator -- Chapter 2: SEC and Other Important Cyber Regulations -- Chapter 3: The Courts Are Picking Up the Cyber Pace -- Chapter 4: The Most Critical Cybersecurity Decision -- Chapter 5: Justifying ECRM Funding -- Chapter 6: The C-Suite and Board Role -- Part II: Building and Implementing Your ECRM Program -- Chapter 7: Integrating ECRM into Business Strategy -- Chapter 8: Getting Started -- Chapter 9: ECRM Guiding Principles and Business Alignment -- Chapter 10: Three Vital ECRM Building Blocks -- Chapter 11: Adapting Your ECRM Process to Include Cyber Opportunities -- Chapter 12: Additional Essential ECRM Program Events -- Appendix A: What to Look for in an ECRM Company and Solution -- Appendix B: Enterprise Cyber Risk Management Software (ECRMS) -- Appendix C: The Benefits of a NIST-Based ECRM Approach -- Appendix D: Twenty-Five Essential Terms for Your ECRM Glossary -- Appendix E: Sample ECRM Program and Cybersecurity Strategy Table of Contents.
"This book should be mandatory reading for C-suite executives and board members. It shows you how to move from viewing cybersecurity as a risk to avoid, and a cost center that does not add value and is overhead, to seeing cybersecurity as an enabler and part of your core strategy to transform your business and earn customer and stakeholder trust." -Paul Connelly, First CISO at the White House and HCA Healthcare This book will help you learn the importance of organizations treating enterprise cyber risk management (ECRM) as a value creator, a business enabler, and a mechanism to create a competitive advantage. Organizations began to see the real value of information and information technology in the mid-1980s. Forty years later, it's time to leverage your ECRM program and cybersecurity strategy in the same way. The main topics covered include the case for action with specific coverage on the topic of cybersecurity as a value creator, including how the courts, legislators, and regulators are raising the bar for C-suite executives and board members. The book covers how the board's three primary responsibilities (talent management, strategy, and risk management) intersect with their ECRM responsibilities. ECRM was once solely focused on managing the downside of risk by defending the organization from adversarial, accidental, structural, and environmental threat sources. Author Bob Chaput presents the view that we must focus equally on managing the upside of cyber strengths to increase customer trust and brand loyalty, improving social responsibility, driving revenue growth, lowering the cost of capital, attracting higher quality investments, creating competitive advantage, attracting and retaining talent, and facilitating M&A work. He focuses on the C-suite and board role in the first part and provides guidance on their roles and responsibilities, the most important decision about ECRM they must facilitate, and how to think differently about ECRM funding. You will learn how to the pivot from cost-center thinking to value-center thinking. Having built the case for action, in the second part, the book details the steps that organizations must take to develop and document their ECRM program and cybersecurity strategy. The book first covers how ECRM must be integrated into business strategy. The remainder of that part presents a sample table of contents for an ECRM Program and Cybersecurity Strategy document and works through each section to facilitate development of your own program and strategy. With all the content and ideas presented, you will be able to establish, implement, and mature your program and strategy.
ISBN: 9798868800948$q(electronic bk.)
Standard No.: 10.1007/979-8-8688-0094-8doiSubjects--Topical Terms:
230939
Computer security
--Management.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 658.478
Enterprise cyber risk management as a value creatorleverage cybersecurity for competitive advantage /
LDR
:04846nmm a2200349 a 4500
001
663545
003
DE-He213
005
20240123174527.0
006
m d
007
cr nn 008maaau
008
241203s2024 cau s 0 eng d
020
$a
9798868800948$q(electronic bk.)
020
$a
9798868800931$q(paper)
024
7
$a
10.1007/979-8-8688-0094-8
$2
doi
035
$a
979-8-8688-0094-8
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
658.478
$2
23
090
$a
QA76.9.A25
$b
C468 2024
100
1
$a
Chaput, Bob.
$3
975871
245
1 0
$a
Enterprise cyber risk management as a value creator
$h
[electronic resource] :
$b
leverage cybersecurity for competitive advantage /
$c
by Bob Chaput ; foreword by Phil Gardner, CEO, IANS Research.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2024.
300
$a
xliii, 388 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Part I: A Case for Action -- Chapter 1: Enterprise Cyber Risk Management as a Value Creator -- Chapter 2: SEC and Other Important Cyber Regulations -- Chapter 3: The Courts Are Picking Up the Cyber Pace -- Chapter 4: The Most Critical Cybersecurity Decision -- Chapter 5: Justifying ECRM Funding -- Chapter 6: The C-Suite and Board Role -- Part II: Building and Implementing Your ECRM Program -- Chapter 7: Integrating ECRM into Business Strategy -- Chapter 8: Getting Started -- Chapter 9: ECRM Guiding Principles and Business Alignment -- Chapter 10: Three Vital ECRM Building Blocks -- Chapter 11: Adapting Your ECRM Process to Include Cyber Opportunities -- Chapter 12: Additional Essential ECRM Program Events -- Appendix A: What to Look for in an ECRM Company and Solution -- Appendix B: Enterprise Cyber Risk Management Software (ECRMS) -- Appendix C: The Benefits of a NIST-Based ECRM Approach -- Appendix D: Twenty-Five Essential Terms for Your ECRM Glossary -- Appendix E: Sample ECRM Program and Cybersecurity Strategy Table of Contents.
520
$a
"This book should be mandatory reading for C-suite executives and board members. It shows you how to move from viewing cybersecurity as a risk to avoid, and a cost center that does not add value and is overhead, to seeing cybersecurity as an enabler and part of your core strategy to transform your business and earn customer and stakeholder trust." -Paul Connelly, First CISO at the White House and HCA Healthcare This book will help you learn the importance of organizations treating enterprise cyber risk management (ECRM) as a value creator, a business enabler, and a mechanism to create a competitive advantage. Organizations began to see the real value of information and information technology in the mid-1980s. Forty years later, it's time to leverage your ECRM program and cybersecurity strategy in the same way. The main topics covered include the case for action with specific coverage on the topic of cybersecurity as a value creator, including how the courts, legislators, and regulators are raising the bar for C-suite executives and board members. The book covers how the board's three primary responsibilities (talent management, strategy, and risk management) intersect with their ECRM responsibilities. ECRM was once solely focused on managing the downside of risk by defending the organization from adversarial, accidental, structural, and environmental threat sources. Author Bob Chaput presents the view that we must focus equally on managing the upside of cyber strengths to increase customer trust and brand loyalty, improving social responsibility, driving revenue growth, lowering the cost of capital, attracting higher quality investments, creating competitive advantage, attracting and retaining talent, and facilitating M&A work. He focuses on the C-suite and board role in the first part and provides guidance on their roles and responsibilities, the most important decision about ECRM they must facilitate, and how to think differently about ECRM funding. You will learn how to the pivot from cost-center thinking to value-center thinking. Having built the case for action, in the second part, the book details the steps that organizations must take to develop and document their ECRM program and cybersecurity strategy. The book first covers how ECRM must be integrated into business strategy. The remainder of that part presents a sample table of contents for an ECRM Program and Cybersecurity Strategy document and works through each section to facilitate development of your own program and strategy. With all the content and ideas presented, you will be able to establish, implement, and mature your program and strategy.
650
0
$a
Computer security
$x
Management.
$3
230939
650
0
$a
Computer networks
$x
Security measures.
$3
185597
650
0
$a
Computer crimes
$x
Prevention.
$3
317273
650
0
$a
Business intelligence.
$3
202057
650
0
$a
Risk management.
$3
174339
650
1 4
$a
Data and Information Security.
$3
913130
650
2 4
$a
IT Risk Management.
$3
913392
700
1
$a
Gardner, Phil.
$3
975872
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/979-8-8688-0094-8
950
$a
Professional and Applied Computing (SpringerNature-12059)
筆 0 讀者評論
多媒體
多媒體檔案
https://doi.org/10.1007/979-8-8688-0094-8
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入