Cyber Resilience in Banking A Practical Guide to Governance, Risk, and Compliance.

Drawing on the authors' experience as a cybersecurity practitioner, technology risk leader, and educator, he has crafted this series to bridge the gap between theoretical frameworks and practical applications in banking security.

Saved in:
Bibliographic Details
Main Author Young, Richard Gwashy
Format Electronic eBook
LanguageEnglish
Published Oxford : Productivity Press, 2026.
Subjects
Online AccessFull text
ISBN9781040441152
1040441157
9781003654766
1003654762
9781040441176
1040441173
Physical Description1 online resource (217 p.)

Cover

LEADER 00000cam a2200000Mu 4500
001 tf-9781003654766
003 FlBoTFG
005 20260112110152.6
006 m o d
007 cr cnu||||||||
008 251101s2026 enk o ||| 0 eng d
040 |a OCoLC-P  |b eng  |c OCoLC-P 
020 |a 9781040441152 
020 |a 1040441157 
020 |a 9781003654766  |q (electronic bk.) 
020 |a 1003654762  |q (electronic bk.) 
020 |a 9781040441176  |q (electronic bk. : EPUB) 
020 |a 1040441173  |q (electronic bk. : EPUB) 
024 7 |a 10.4324/9781003654766  |2 doi 
035 |a (OCoLC)1545638316 
035 |a (OCoLC-P)1545638316 
100 1 |a Young, Richard Gwashy. 
245 1 0 |a Cyber Resilience in Banking  |h [electronic resource] :  |b A Practical Guide to Governance, Risk, and Compliance. 
260 |a Oxford :  |b Productivity Press,  |c 2026. 
300 |a 1 online resource (217 p.) 
500 |a Description based upon print version of record. 
505 0 |a Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- 0.1 The Complex Global Banking System -- 0.2 Cyber Resilience in Banking -- 0.2.1 Risk Management and Assessment -- 0.2.2 Incident Response and Recovery -- 0.2.3 Business Continuity Planning -- 0.2.4 Adaptive Learning and Intelligence Sharing -- 0.2.5 Cultural and Organizational Aspects -- 0.2.6 Regulatory Compliance and Governance -- 0.3 Relationship with Cybersecurity -- 0.4 Governance, Risk, and Compliance -- 0.5 Governance, Risk, and Control (GRC) in Banking 
505 8 |a 0.6 Governance, Risk, and Control in Banking -- 0.6.1 Governance -- 0.6.2 Risk Management -- 0.6.3 Control -- 0.6.4 Importance of GRC in Achieving Cyber Resilience and Compliance -- 0.7 Enhancing Cyber Resilience through GRC -- 0.7.1 Holistic Risk Approach -- 0.7.2 Regulatory Compliance -- 0.7.3 Incident Response and Recovery -- 0.8 Relationship between GRC, Cyber Resilience, and Cybersecurity -- 0.9 Key Themes -- 0.9.1 Building Cyber Resilience in Banking Institutions -- 0.9.2 Cybersecurity Governance and the Role of Leadership -- 0.9.3 Technology Risk Management Frameworks 
505 8 |a 0.9.4 Cybersecurity Regulations and Compliance -- 0.9.5 Cyber Risk Quantification for Effective Decision-Making -- 0.10 Why This Book Matters -- 0.11 Who Should Read This Book? -- 0.12 A Blend of Theory and Practice -- 0.13 A Note of Appreciation -- 0.14 Final Thoughts -- Chapter 1 Cyber Resilience in Banking: Practical Guide to GRC -- 1.1 Introduction -- 1.2 Overview of the Banking Threat Landscape -- 1.3 The Banking Threat Landscape -- 1.4 Securing Banking Systems -- 1.4.1 The Evolving Nature of Cyber Threats -- 1.4.1.1 Cyber Threat Identification and Mitigation 
505 8 |a 1.4.1.2 Ensuring Resiliency and Avoiding Reputational Damage -- 1.4.2 Key Threat Actors -- 1.4.3 Common Attack Vectors -- 1.4.4 Impact of Cyberattacks on Banks -- 1.4.5 Cybersecurity Frameworks -- 1.4.5.1 Understanding Cybersecurity Frameworks -- 1.4.5.2 The Role of Cybersecurity Frameworks -- 1.4.5.3 Importance of Cybersecurity Frameworks -- 1.4.5.4 Comparison of Frameworks -- 1.4.5.5 Cyber Resilience in Banking in Relation to Cybersecurity -- 1.4.6 Risk Assessment Methodologies -- 1.4.6.1 Risk Assessment in Relation to Cybersecurity Resilience -- 1.4.6.2 Understanding Risk Assessment 
505 8 |a 1.4.6.3 Importance of Risk Assessment in Cybersecurity Resilience -- 1.4.6.4 Qualitative vs. Quantitative Risk Assessment in Cybersecurity Resilience -- 1.4.6.5 Qualitative Risk Assessment -- 1.4.6.6 Quantitative Risk Assessment -- 1.4.6.7 Importance of Risk Assessment Methods in Cybersecurity Resilience -- 1.4.6.8 Risk Quantification and Its Importance in Cybersecurity -- 1.4.6.9 The Risk Quantification Equation -- 1.4.6.10 Importance of Likelihood in Risk Quantification -- 1.4.6.11 Importance of Impact in Risk Quantification -- 1.4.6.12 Interplay between Likelihood and Impact 
500 |a 1.5 Implications for Enhancing Organizational Security Posture 
506 |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty 
520 |a Drawing on the authors' experience as a cybersecurity practitioner, technology risk leader, and educator, he has crafted this series to bridge the gap between theoretical frameworks and practical applications in banking security. 
588 |a OCLC-licensed vendor bibliographic record. 
650 0 |a Banks and banking  |x Data processing  |x Security measures. 
650 0 |a Banks and banking  |x Computer networks  |x Security measures. 
650 0 |a Computer security. 
655 7 |a elektronické knihy  |7 fd186907  |2 czenas 
655 9 |a electronic books  |2 eczenas 
856 4 0 |u https://proxy.k.utb.cz/login?url=https://www.taylorfrancis.com/books/9781003654766