Cyber intelligence-driven risk: how to build and use cyber intelligence for business risk decisions (Record no. 1664)

MARC details
000 -LEADER
fixed length control field 02285nam a2200229 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250716104838.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250716b2021|||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119676911
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title English
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.9065
100 ## - MAIN ENTRY--AUTHOR NAME
Personal name Moore, Richard O.
Relator term Author
245 ## - TITLE STATEMENT
Title Cyber intelligence-driven risk: how to build and use cyber intelligence for business risk decisions
250 ## - EDITION STATEMENT
Edition statement 1st ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication New Jersey:
Name of publisher Wiley Data and Cybersecurity,
Year of publication 2021.
300 ## - PHYSICAL DESCRIPTION
Number of Pages xxii, 161p.
500 ## - GENERAL NOTE
General note Turn cyber intelligence into meaningful business decisions and reduce losses from cyber events<br/><br/>Cyber Intelligence-Driven Risk provides a solution to one of the most pressing issues that executives and risk managers face: How can we weave information security into our business decisions to minimize overall business risk?<br/><br/>In today's complex digital landscape, business decisions and cyber event responses have implications for information security that high-level actors may be unable to foresee. What we need is a cybersecurity command center capable of delivering, not just data, but concise, meaningful interpretations that allow us to make informed decisions.<br/><br/>Building, buying, or outsourcing a CI-DR™ program is the answer. In his work with executives at leading financial organizations and with the U.S. military, author Richard O. Moore III has tested and proven this next-level approach to Intelligence and Risk. This book is a guide to:<br/><br/>Building, buying, or outsourcing a cyber intelligence–driven risk program<br/>Understanding the functional capabilities needed to sustain the program<br/>Using cyber intelligence to support Enterprise Risk Management<br/>Reducing loss from cyber events by building new organizational capacities<br/>Supporting mergers and acquisitions with predictive analytics<br/>Each function of a well-designed cyber intelligence-driven risk program can support informed business decisions in the era of increased complexity and emergent cyber threats.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Cyber Intelligence‐Driven Risk Program
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Cyber Intelligence for Businesses
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Functional Capabilities of the CI‐DRTM Program
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://ieeexplore.ieee.org/servlet/opac?bknumber=9820874
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type e-Books
Holdings
Withdrawn status Lost status Damaged status Not for loan Permanent Location Current Location Shelving location Coded location qualifier Full call number Accession Number Koha item type
        Dr. S. R. Ranganathan Library Dr. S. R. Ranganathan Library Ebook (Online Access) --- 005.9065 EB0092 e-Books

Implemented and Maintained by Dr. S.R. Ranganathan Library.
For any Suggestions/Query Contact to library or Email: library@iipe.ac.in
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.

Powered by Koha