Details

Cyber Intelligence-Driven Risk


Cyber Intelligence-Driven Risk

How to Build and Use Cyber Intelligence for Business Risk Decisions
1. Aufl.

von: Richard O. Moore

28,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 18.11.2020
ISBN/EAN: 9781119676911
Sprache: englisch
Anzahl Seiten: 192

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<p><b>Turn cyber intelligence into meaningful business decisions and reduce losses from cyber events</b></p> <p><i>Cyber Intelligence-Driven Risk</i> provides a solution to one of the most pressing issues that executives and risk managers face: How can we weave information security into our business decisions to minimize <i>overall</i> business risk?</p> <p>In today's complex digital landscape, business decisions and cyber event responses have implications for information security that high-level actors may be unable to foresee. What we need is a cybersecurity command center capable of delivering, not just data, but concise, meaningful interpretations that allow us to make informed decisions.</p> <p>Building, buying, or outsourcing a CI-DR™ program is the answer. In his work with executives at leading financial organizations and with the U.S. military, author Richard O. Moore III has tested and proven this next-level approach to Intelligence and Risk. This book is a guide to:</p> <ul style="line-height: 25px; margin-left: 15px; margin-top: 0px; font-family: Arial; font-size: 13.3333px;"> <li>Building, buying, or outsourcing a cyber intelligence–driven risk program</li> <li>Understanding the functional capabilities needed to sustain the program</li> <li>Using cyber intelligence to support Enterprise Risk Management</li> <li>Reducing loss from cyber events by building new organizational capacities</li> <li>Supporting mergers and acquisitions with predictive analytics</li> </ul> <p>Each function of a well-designed cyber intelligence-driven risk program can support informed business decisions in the era of increased complexity and emergent cyber threats.</p>
<p>Preface vii</p> <p>Acknowledgments xi</p> <p>Introduction xv</p> <p>Chapter 1: Objectives of a Cyber Intelligence-Driven Risk Program 1</p> <p>Notes 5</p> <p>Chapter 2: Importance of Cyber Intelligence for Businesses 7</p> <p>Notes 14</p> <p>Chapter 3: Military to Commercial Viability of the CI-DR<sup>™</sup> Program 15</p> <p>Notes 23</p> <p>Chapter 4: CI-DR<sup>™</sup> Security Program Components 25</p> <p>Notes 39</p> <p>Chapter 5: Functional Capabilities of the CI-DRTM Program 41</p> <p>Notes 54</p> <p>Chapter 6: CI-DR<sup>™</sup> Key Capability Next-Generation Security Operations Center 55</p> <p>Introduction by Kiran Vangaveti – CEO of BluSapphire 55</p> <p>Notes 60</p> <p>Chapter 7: CI-DR<sup>™</sup> Key Capability Cyber Threat Intelligence 63</p> <p>Notes 70</p> <p>Chapter 8: CI-DR<sup>™</sup> Key Capability Forensic Teams 71</p> <p><i>Dr. Steven Johnson</i></p> <p>Notes 85</p> <p>Chapter 9: CI-DR<sup>™</sup> Key Capability Vulnerability Management Teams 87</p> <p><i>By Derek Olson</i></p> <p>Notes 103</p> <p>Chapter 10: CI-DR<sup>™</sup> Key Capability Incident Response Teams 105</p> <p><i>By Dr. Steven Johnson</i></p> <p>Notes 122</p> <p>Chapter 11: CI-DR<sup>™</sup> Collection Components 123</p> <p>Notes 125</p> <p>Chapter 12: CI-DR<sup>™</sup> Stakeholders 127</p> <p><i>By Steve Dufour, CEO</i></p> <p>Notes 133</p> <p>Conclusion 135</p> <p>Glossary 139</p> <p>About the Author and Chapter Authors 145</p> <p>Index 149</p>
<p><b>RICHARD O. MOORE III,</b> MSIA, CISSP, CISM, is founder and CEO of CyberSix, a consultancy that provides executive cyber leadership. Previously, Moore served in top Intelligence and Risk roles at Alvarez and Marsal, New York Life Insurance Company, KPMG, and the Royal Bank of Scotland. He also spent 15 years with the U.S. Marine Corps Intelligence Community.
<p><b>Turn cyber intelligence into meaningful business decisions and reduce losses from cyber events</b> <p><i>Cyber Intelligence-Driven Risk</i> provides a solution to one of the most pressing issues that executives and risk managers face: How can we weave information security into our business decisions to minimize <i>overall</i> business risk? <p>In today's complex digital landscape, business decisions and cyber event responses have implications for information security that high-level actors may be unable to foresee. What we need is a cybersecurity command center capable of delivering, not just data, but concise, meaningful interpretations that allow us to make informed decisions. <p>Building, buying, or outsourcing a CI-DR™ program is the answer. In his work with executives at leading financial organizations and with the U.S. military, author Richard O. Moore III has tested and proven this next-level approach to Intelligence and Risk. This book is a guide to: <ul> <li>Building, buying, or outsourcing a cyber intelligence–driven risk program</li> <li>Understanding the functional capabilities needed to sustain the program</li> <li>Using cyber intelligence to support Enterprise Risk Management</li> <li>Reducing loss from cyber events by building new organizational capacities</li> <li>Supporting mergers and acquisitions with predictive analytics</li> </ul> <p>Each function of a well-designed cyber intelligence-driven risk program can support informed business decisions in the era of increased complexity and emergent cyber threats.

Diese Produkte könnten Sie auch interessieren:

Visual Six Sigma
Visual Six Sigma
von: Ian Cox, Marie A. Gaudard, Mia L. Stephens
PDF ebook
52,99 €
Marketing Performance
Marketing Performance
von: Thomas Bauer, Tjark Freundt, Jonathan Gordon, Jesko Perrey, Dennis Spillecke
PDF ebook
21,99 €
Marketing Performance
Marketing Performance
von: Thomas Bauer, Tjark Freundt, Jonathan Gordon, Jesko Perrey, Dennis Spillecke
EPUB ebook
21,99 €