Muutke küpsiste eelistusi

E-raamat: Optimal Spending on Cybersecurity Measures: Third Party Risk Management

  • Formaat: PDF+DRM
  • Ilmumisaeg: 23-May-2025
  • Kirjastus: CRC Press
  • Keel: eng
  • ISBN-13: 9781040356524
  • Formaat - PDF+DRM
  • Hind: 67,59 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Ilmumisaeg: 23-May-2025
  • Kirjastus: CRC Press
  • Keel: eng
  • ISBN-13: 9781040356524

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Optimal Spending on Cybersecurity Measures: Third Party Risk Management introduces the cyber risk investment model, and the cybersecurity risk management framework used within business-driven risk assessments to address government regulations, industry standards and applicable Laws.



This book aims to demonstrate the use of business-driven risk assessments to address government regulations and guidelines specific to the management of risks related to all third-party arrangements and emphasises that organisations retain accountability for business activities, functions and services outsourced to a third party.

This book introduces the cyber risk investment model and the cybersecurity risk management framework used within business-driven risk assessments to address government regulations, industry standards and applicable laws. This can be used by various stakeholders who are involved in the implementation of cybersecurity measures to safeguard sensitive data. This framework facilitates an organisation’s risk management decision-making process to demonstrate the mechanisms in place to fund cybersecurity measures and demonstrates the application of the process showcasing three case studies. This book also discusses the elements used within the cybersecurity risk management process and defines a strategic approach to minimise cybersecurity risks.

Features:

  • Aims to strengthen the reader’s understanding of industry governance, risk and compliance practices.
  • Incorporates an innovative approach to assess business risk management.
  • Explores the strategic decisions made by organisations when implementing cybersecurity measures and leverages an integrated approach to include risk management elements.
1. Introduction,
2. Privacy Laws,
3. Data Protection,
4. ThirdParty
Risk Management,
5. Technology and Cyber Risk,
6. Governance,
7.
Cybersecurity Risk Management Framework,
8. Case Study #1: Chime Live,
9.
Case Study #2: Alumni Learning Consortium,
10. Case Study #3: Marketing
Automation Tool
Sherita-Tara (Tara) Kissoon, MSc, MBA, CISSP, CISA, is a multi-certified I.T. Risk & Security Leader with twenty-five years of technology experience, twenty years of experience in the financial services industry focusing on technology, cybersecurity, governance, risk and compliance, along with professional and community volunteering. Tare actively volunteering at ISACA, ISC2, University of London and St. Patricks Parish in Markham, and have attained my Enhanced Police Information Check (E-PIC), Vulnerable Sector Check, NEXUS, Biometrics, Bail Verification and maintain medical records for identity verification, to volunteer/work in high-risk communities, and cross borders as a trusted traveler.

Tara Kissoon is a multi-certified I.T. Risk & Security Leader with 25+ years of technology experience, 20 years of executive experience in the financial services industry. She brings continued success on leading Technology, I.T. Risk and Information Security projects and programs within large organizations. She is acknowledged as a leader and trusted advisor with a talent for effective resource management, steering traditional and diverse cross-functional staff to achieve short and long-term business objectives. Relevant Publication include (ORCID: 0000-0001-6903-1938) 1) Book (2024): Routledge (Taylor & Francis) Optimal Spending on Cybersecurity Measures: Protecting Health Information 2) Book (2024): Routledge (Taylor & Francis) Optimal Spending on Cybersecurity Measures: Digital Privacy and Data Protection 3) Book (2024): Routledge (Taylor & Francis) Optimal Spending on Cybersecurity Measures: DevOps, 4) Book (2022): Routledge (Taylor & Francis) Optimal Spending on Cybersecurity Measures: Risk Management, 5) Article (2021): Journal of Information Security (Vol.12 No.1, Jan 2021) - Optimum Spending on Cybersecurity Measures Part II, 6) Article (2020): Emerald Publishing Limited - Optimum Spending on Cybersecurity Measures, 7) ISACA TIPs column (2012 - 2014), and 8) ISACA Online Journal (2008): Strengthening Access using Smart Cards. CV is enclosed.