|
|
|
|
LEADER |
04571nam a2200481 4500 |
001 |
978-1-4842-4194-3 |
003 |
DE-He213 |
005 |
20190618031831.0 |
007 |
cr nn 008mamaa |
008 |
181213s2019 xxu| s |||| 0|eng d |
020 |
|
|
|a 9781484241943
|9 978-1-4842-4194-3
|
024 |
7 |
|
|a 10.1007/978-1-4842-4194-3
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
100 |
1 |
|
|a Rohmeyer, Paul.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Financial Cybersecurity Risk Management
|h [electronic resource] :
|b Leadership Perspectives and Guidance for Systems and Institutions /
|c by Paul Rohmeyer, Jennifer L. Bayuk.
|
250 |
|
|
|a 1st ed. 2019.
|
264 |
|
1 |
|a Berkeley, CA :
|b Apress :
|b Imprint: Apress,
|c 2019.
|
300 |
|
|
|a XXI, 259 p. 48 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a Chapter 1: What Are We Afraid Of? -- Chapter 2: Where Are We Vulnerable? -- Chapter 3: What Would a Breach Cost Us? -- Chapter 4: What Are the Odds? -- Chapter 5: So What Can We Do? -- Chapter 6: How Do I Manage This? -- Chapter 7: Should This Involve the Whole Organization? -- Chapter 8: How Can We Improve Our Capabilities? -- Chapter 9: What Can We Learn from Losses? -- Chapter 10: So What's Next?.
|
520 |
|
|
|a Understand critical cybersecurity and risk perspectives, insights, and tools for the leaders of complex financial systems and markets. This book offers guidance for decision makers and helps establish a framework for communication between cyber leaders and front-line professionals. Information is provided to help in the analysis of cyber challenges and choosing between risk treatment options. Financial cybersecurity is a complex, systemic risk challenge that includes technological and operational elements. The interconnectedness of financial systems and markets creates dynamic, high-risk environments where organizational security is greatly impacted by the level of security effectiveness of partners, counterparties, and other external organizations. The result is a high-risk environment with a growing need for cooperation between enterprises that are otherwise direct competitors. There is a new normal of continuous attack pressures that produce unprecedented enterprise threats that must be met with an array of countermeasures. Financial Cybersecurity Risk Management explores a range of cybersecurity topics impacting financial enterprises. This includes the threat and vulnerability landscape confronting the financial sector, risk assessment practices and methodologies, and cybersecurity data analytics. Governance perspectives, including executive and board considerations, are analyzed as are the appropriate control measures and executive risk reporting. What You'll Learn: Analyze the threat and vulnerability landscape confronting the financial sector Implement effective technology risk assessment practices and methodologies Craft strategies to treat observed risks in financial systems Improve the effectiveness of enterprise cybersecurity capabilities Evaluate critical aspects of cybersecurity governance, including executive and board oversight Identify significant cybersecurity operational challenges Consider the impact of the cybersecurity mission across the enterprise Leverage cybersecurity regulatory and industry standards to help manage financial services risks Use cybersecurity scenarios to measure systemic risks in financial systems environments Apply key experiences from actual cybersecurity events to develop more robust cybersecurity architectures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Risk management.
|
650 |
1 |
4 |
|a Systems and Data Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28060
|
650 |
2 |
4 |
|a Risk Management.
|0 http://scigraph.springernature.com/things/product-market-codes/612040
|
700 |
1 |
|
|a Bayuk, Jennifer L.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9781484241936
|
776 |
0 |
8 |
|i Printed edition:
|z 9781484241950
|
776 |
0 |
8 |
|i Printed edition:
|z 9781484247716
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-1-4842-4194-3
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-CWD
|
950 |
|
|
|a Professional and Applied Computing (Springer-12059)
|