How Cyber Security Can Protect Your Business : a Guide for All Stakeholders.
How Cyber Security Can Protect your Business - A guide for all stakeholders provides an effective and efficient framework for managing cyber governance, risk and compliance, which organisations can adapt to meet their own risk appetite and synchronise with their people, processes and technology.
Saved in:
| Main Author | |
|---|---|
| Format | Electronic eBook |
| Language | English |
| Published |
Ely :
IT Governance Ltd,
2019.
|
| Subjects | |
| Online Access | Full text |
| ISBN | 9781787781962 1787781968 9781787781955 178778195X 9781787781979 1787781976 |
| Physical Description | 1 online resource (68 pages) |
Cover
| LEADER | 00000cam a2200000Mi 4500 | ||
|---|---|---|---|
| 001 | kn-on1128417557 | ||
| 003 | OCoLC | ||
| 005 | 20240717213016.0 | ||
| 006 | m o d | ||
| 007 | cr cn||||||||| | ||
| 008 | 191123s2019 xx o 000 0 eng d | ||
| 040 | |a EBLCP |b eng |e pn |c EBLCP |d JSTOR |d EBLCP |d OCLCF |d OCLCQ |d VT2 |d UX1 |d COO |d OCLCO |d FZL |d OCLCQ |d OCLCO |d OCLCL |d DEGRU | ||
| 020 | |a 9781787781962 |q (electronic bk.) | ||
| 020 | |a 1787781968 |q (electronic bk.) | ||
| 020 | |a 9781787781955 | ||
| 020 | |a 178778195X |q (Trade Paper) | ||
| 020 | |a 9781787781979 | ||
| 020 | |a 1787781976 | ||
| 024 | 3 | |a 9781787781955 | |
| 024 | 8 | |a 9781787781979 | |
| 035 | |a (OCoLC)1128417557 |z (OCoLC)1153022044 |z (OCoLC)1175627830 |z (OCoLC)1192346237 |z (OCoLC)1202553781 |z (OCoLC)1235828052 |z (OCoLC)1351582486 | ||
| 100 | 1 | |a Wright, Christopher. | |
| 245 | 1 | 0 | |a How Cyber Security Can Protect Your Business : |b a Guide for All Stakeholders. |
| 260 | |a Ely : |b IT Governance Ltd, |c 2019. | ||
| 300 | |a 1 online resource (68 pages) | ||
| 336 | |a text |b txt |2 rdacontent | ||
| 337 | |a computer |b c |2 rdamedia | ||
| 338 | |a online resource |b cr |2 rdacarrier | ||
| 505 | 0 | |a Cover; Title; Copyright; Foreword; Preface; About the Author; Acknowledgements; Contents; Chapter 1: Introduction to cyber security GRC; Background to GRC; The three lines of defence model; What is the relevance of GRC to cyber?; Chapter 2: Cyber security governance; Introduction and overview; Culture and awareness; Threat and risk awareness; Risk management; Responding to cyber incidents; Cyber SOX; Summary: key cyber security questions for directors to ask; Chapter 3: Cyber security risk management; Introduction and overview; Risk management scoping; Process and control mapping | |
| 505 | 8 | |a Risk assessmentDesigning and implementing controls; Testing of controls; Summary; Chapter 4: Cyber risks and controls; Introduction and overview; Identifying cyber risks and controls; Third-party service providers; Protecting against cyber risks; Summary; Chapter 5: Responding to an attack; Introduction and overview; Preparing for cyber attacks; Detecting potential cyber attacks; Recovery following a cyber attack; Summary; Chapter 6: Cyber compliance; Overview and introduction; Cyber compliance requirements; Summary; Books by the same author; Further reading | |
| 506 | |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty | ||
| 520 | |a How Cyber Security Can Protect your Business - A guide for all stakeholders provides an effective and efficient framework for managing cyber governance, risk and compliance, which organisations can adapt to meet their own risk appetite and synchronise with their people, processes and technology. | ||
| 590 | |a Knovel |b Knovel (All titles) | ||
| 650 | 0 | |a Computer security. | |
| 655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
| 655 | 9 | |a electronic books |2 eczenas | |
| 776 | 0 | 8 | |i Print version: |a Wright, Christopher. |t How Cyber Security Can Protect Your Business : A Guide for All Stakeholders. |d Ely : IT Governance Ltd, ©2019 |z 9781787781955 |
| 856 | 4 | 0 | |u https://proxy.k.utb.cz/login?url=https://app.knovel.com/hotlink/toc/id:kpHCSCPYB7/how-cyber-security?kpromoter=marc |y Full text |