Cyber intelligence-driven risk: how to build and use cyber intelligence for business risk decisions (Record no. 1664)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 02285nam a2200229 4500 |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20250716104838.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 250716b2021|||||||| |||| 00| 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| ISBN | 9781119676911 |
| 041 ## - LANGUAGE CODE | |
| Language code of text/sound track or separate title | English |
| 082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.9065 |
| 100 ## - MAIN ENTRY--AUTHOR NAME | |
| Personal name | Moore, Richard O. |
| Relator term | Author |
| 245 ## - TITLE STATEMENT | |
| Title | Cyber intelligence-driven risk: how to build and use cyber intelligence for business risk decisions |
| 250 ## - EDITION STATEMENT | |
| Edition statement | 1st ed. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
| Place of publication | New Jersey: |
| Name of publisher | Wiley Data and Cybersecurity, |
| Year of publication | 2021. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Number of Pages | xxii, 161p. |
| 500 ## - GENERAL NOTE | |
| General note | Turn cyber intelligence into meaningful business decisions and reduce losses from cyber events<br/><br/>Cyber Intelligence-Driven Risk provides a solution to one of the most pressing issues that executives and risk managers face: How can we weave information security into our business decisions to minimize overall business risk?<br/><br/>In today's complex digital landscape, business decisions and cyber event responses have implications for information security that high-level actors may be unable to foresee. What we need is a cybersecurity command center capable of delivering, not just data, but concise, meaningful interpretations that allow us to make informed decisions.<br/><br/>Building, buying, or outsourcing a CI-DR™ program is the answer. In his work with executives at leading financial organizations and with the U.S. military, author Richard O. Moore III has tested and proven this next-level approach to Intelligence and Risk. This book is a guide to:<br/><br/>Building, buying, or outsourcing a cyber intelligence–driven risk program<br/>Understanding the functional capabilities needed to sustain the program<br/>Using cyber intelligence to support Enterprise Risk Management<br/>Reducing loss from cyber events by building new organizational capacities<br/>Supporting mergers and acquisitions with predictive analytics<br/>Each function of a well-designed cyber intelligence-driven risk program can support informed business decisions in the era of increased complexity and emergent cyber threats. |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Cyber Intelligence‐Driven Risk Program |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Cyber Intelligence for Businesses |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Functional Capabilities of the CI‐DRTM Program |
| 856 ## - ELECTRONIC LOCATION AND ACCESS | |
| Uniform Resource Identifier | https://ieeexplore.ieee.org/servlet/opac?bknumber=9820874 |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Koha item type | e-Books |
| Withdrawn status | Lost status | Damaged status | Not for loan | Permanent Location | Current Location | Shelving location | Coded location qualifier | Full call number | Accession Number | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|
| Dr. S. R. Ranganathan Library | Dr. S. R. Ranganathan Library | Ebook (Online Access) | --- | 005.9065 | EB0092 | e-Books |