Hugendubel.info - Die B2B Online-Buchhandlung 

Merkliste
Die Merkliste ist leer.
Bitte warten - die Druckansicht der Seite wird vorbereitet.
Der Druckdialog öffnet sich, sobald die Seite vollständig geladen wurde.
Sollte die Druckvorschau unvollständig sein, bitte schliessen und "Erneut drucken" wählen.

Financial Cybersecurity Risk Management

E-BookPDF1 - PDF WatermarkE-Book
259 Seiten
Englisch
Apresserschienen am13.12.20181st ed
Understand critical cybersecurity and risk perspectives, insights, and tools for the leaders of complex financial systems and markets. This book offers guidance for decision makers and helps establish a framework for communication between cyber leaders and front-line professionals. Information is provided to help in the analysis of cyber challenges and choosing between risk treatment options.



Financial cybersecurity is a complex, systemic risk challenge that includes technological and operational elements. The interconnectedness of financial systems and markets creates dynamic, high-risk environments where organizational security is greatly impacted by the level of security effectiveness of partners, counterparties, and other external organizations. The result is a high-risk environment with a growing need for cooperation between enterprises that are otherwise direct competitors. There is a new normal of continuous attack pressures that produce unprecedented enterprise threats that must be met with an array of countermeasures.




Financial Cybersecurity Risk Management explores a range of cybersecurity topics impacting financial enterprises. This includes the threat and vulnerability landscape confronting the financial sector, risk assessment practices and methodologies, and cybersecurity data analytics. Governance perspectives, including executive and board considerations, are analyzed as are the appropriate control measures and executive risk reporting.




What You'll Learn


Analyze the threat and vulnerability landscape confronting the financial sector

Implement effective technology risk assessment practices and methodologies

Craft strategies to treat observed risks in financial systems
Improve the effectiveness of enterprise cybersecurity capabilities

Evaluate critical aspects of cybersecurity governance, including executive and board oversight

Identify significant cybersecurity operational challenges

Consider the impact of the cybersecurity mission across the enterprise
Leverage cybersecurity regulatory and industry standards to help manage financial services risks
Use cybersecurity scenarios to measure systemic risks in financial systems environments
Apply key experiences from actual cybersecurity events to develop more robust cybersecurity architectures




Who This Book Is For

Decision makers, cyber leaders, and front-line professionals, including: chief risk officers, operational risk officers, chief information security officers, chief security officers, chief information officers, enterprise risk managers, cybersecurity operations directors, technology and cybersecurity risk analysts, cybersecurity architects and engineers, and compliance officers




Paul Rohmeyer has extensive industry and academic experience in many areas, including: information systems management, IT audit, information security, business continuity planning, and vendor management. He is a faculty member at the School of Business at Stevens Institute of Technology and has presented and published on information security, decision making, and business continuation. He has provided senior-level guidance to numerous financial institutions in the areas of risk management, information assurance, and network security over the past two decades.




Prior to his consulting career, Paul served as Director of IT for AXA Financial and Director of IT Architecture Planning for SAIC/Bellcore. He has MS and PhD degrees in information management from Stevens Institute of Technology, an MBA in finance from St. Joseph's University, and a BA in economics from Rutgers University. He has achieved the CGEIT (Certified in the Governance of Enterprise IT), PMP (Project Management Professional), and NSA-IAM (US National Security Agency Information Assurance Methodology) credentials.


Jennifer L. Bayuk is a cybersecurity due diligence expert, cybersecurity risk management consultant, and an adjunct professor at Stevens Institute of Technology. She has served in many roles, including: global financial services technology risk management officer, Wall Street chief information security officer, Big 4 information risk management consultant, manager of information technology internal audit, security architect, Bell Labs security software engineer, professor of systems security engineering, private cybersecurity investigator, and expert witness.


Jennifer has written numerous publications on information security management, information technology risk management, information security tools and techniques, cybersecurity forensics, technology-related privacy issues, audit of physical and information systems, security awareness education, and systems security metrics. She has master degrees in computer science and philosophy, and a PhD in systems engineering. Her certifications include CISSP, CISA, CISM, CGEIT, and a New Jersey state private investigator license.
mehr
Verfügbare Formate
BuchKartoniert, Paperback
EUR58,84
E-BookPDF1 - PDF WatermarkE-Book
EUR56,99

Produkt

KlappentextUnderstand critical cybersecurity and risk perspectives, insights, and tools for the leaders of complex financial systems and markets. This book offers guidance for decision makers and helps establish a framework for communication between cyber leaders and front-line professionals. Information is provided to help in the analysis of cyber challenges and choosing between risk treatment options.



Financial cybersecurity is a complex, systemic risk challenge that includes technological and operational elements. The interconnectedness of financial systems and markets creates dynamic, high-risk environments where organizational security is greatly impacted by the level of security effectiveness of partners, counterparties, and other external organizations. The result is a high-risk environment with a growing need for cooperation between enterprises that are otherwise direct competitors. There is a new normal of continuous attack pressures that produce unprecedented enterprise threats that must be met with an array of countermeasures.




Financial Cybersecurity Risk Management explores a range of cybersecurity topics impacting financial enterprises. This includes the threat and vulnerability landscape confronting the financial sector, risk assessment practices and methodologies, and cybersecurity data analytics. Governance perspectives, including executive and board considerations, are analyzed as are the appropriate control measures and executive risk reporting.




What You'll Learn


Analyze the threat and vulnerability landscape confronting the financial sector

Implement effective technology risk assessment practices and methodologies

Craft strategies to treat observed risks in financial systems
Improve the effectiveness of enterprise cybersecurity capabilities

Evaluate critical aspects of cybersecurity governance, including executive and board oversight

Identify significant cybersecurity operational challenges

Consider the impact of the cybersecurity mission across the enterprise
Leverage cybersecurity regulatory and industry standards to help manage financial services risks
Use cybersecurity scenarios to measure systemic risks in financial systems environments
Apply key experiences from actual cybersecurity events to develop more robust cybersecurity architectures




Who This Book Is For

Decision makers, cyber leaders, and front-line professionals, including: chief risk officers, operational risk officers, chief information security officers, chief security officers, chief information officers, enterprise risk managers, cybersecurity operations directors, technology and cybersecurity risk analysts, cybersecurity architects and engineers, and compliance officers




Paul Rohmeyer has extensive industry and academic experience in many areas, including: information systems management, IT audit, information security, business continuity planning, and vendor management. He is a faculty member at the School of Business at Stevens Institute of Technology and has presented and published on information security, decision making, and business continuation. He has provided senior-level guidance to numerous financial institutions in the areas of risk management, information assurance, and network security over the past two decades.




Prior to his consulting career, Paul served as Director of IT for AXA Financial and Director of IT Architecture Planning for SAIC/Bellcore. He has MS and PhD degrees in information management from Stevens Institute of Technology, an MBA in finance from St. Joseph's University, and a BA in economics from Rutgers University. He has achieved the CGEIT (Certified in the Governance of Enterprise IT), PMP (Project Management Professional), and NSA-IAM (US National Security Agency Information Assurance Methodology) credentials.


Jennifer L. Bayuk is a cybersecurity due diligence expert, cybersecurity risk management consultant, and an adjunct professor at Stevens Institute of Technology. She has served in many roles, including: global financial services technology risk management officer, Wall Street chief information security officer, Big 4 information risk management consultant, manager of information technology internal audit, security architect, Bell Labs security software engineer, professor of systems security engineering, private cybersecurity investigator, and expert witness.


Jennifer has written numerous publications on information security management, information technology risk management, information security tools and techniques, cybersecurity forensics, technology-related privacy issues, audit of physical and information systems, security awareness education, and systems security metrics. She has master degrees in computer science and philosophy, and a PhD in systems engineering. Her certifications include CISSP, CISA, CISM, CGEIT, and a New Jersey state private investigator license.
Details
Weitere ISBN/GTIN9781484241943
ProduktartE-Book
EinbandartE-Book
FormatPDF
Format Hinweis1 - PDF Watermark
FormatE107
Verlag
Erscheinungsjahr2018
Erscheinungsdatum13.12.2018
Auflage1st ed
Seiten259 Seiten
SpracheEnglisch
IllustrationenXXI, 259 p. 48 illus.
Artikel-Nr.4072979
Rubriken
Genre9200

Inhalt/Kritik

Inhaltsverzeichnis
1;Table of Contents;5
2;About the Authors;10
3;Series Editor´s Foreword;12
4;Foreword;17
5;Acknowledgments;19
6;Chapter 1: What Are We Afraid Of?;20
6.1;Understanding the Threat Environment;20
6.2;Overview of the Risk Landscape;21
6.3;Understanding the Adversary;22
6.4;Threat Categories for Financial Organizations;25
6.4.1;That´s Where the Money Is-Theft of Funds;25
6.4.2;Information Is Power-Theft of Data;26
6.4.3;Clogging Up the Works-Threats of Disruption;28
6.5;Facing the Threats;30
6.6;Threat Intelligence;31
6.7;Threat Modeling;32
6.8;Implementation;34
6.9;Moving Ahead;36
6.10;Notes;37
7;Chapter 2: Where Are We Vulnerable?;39
7.1;Cybersecurity Weaknesses;39
7.2;Technology Vulnerabilities;40
7.3;New Technologies;45
7.4;Human Vulnerability Dimensions;47
7.5;An Illustration: Business E-mail Compromise;50
7.6;Understanding the Consequences;52
7.7;Moving Ahead;64
7.8;Notes;64
8;Chapter 3: What Would a Breach Cost Us?;67
8.1;Risk Quantification;67
8.2;Scenario Creation;72
8.3;Scenario Selection;76
8.4;Cost Estimation;80
8.5;Moving Ahead;88
8.6;Notes;88
9;Chapter 4: What Are the Odds?;90
9.1;Plausible Deniability;90
9.2;Cybersecurity Risk As Operational Risk;92
9.3;Shortage of Sufficient Historical Data;95
9.4;Probabilities Driven by Vulnerabilities;99
9.5;The Next Evolution;108
9.6;Moving Ahead;117
9.7;Notes;118
10;Chapter 5: What Can We Do?;122
10.1;Risk Treatment Across the Organization;123
10.1.1;Avoidance;123
10.1.2;Reduction;124
10.1.3;Transfer;128
10.1.4;Acceptance;131
10.2;Risk Treatment Across the Enterprise Architecture;132
10.3;Executing on Risk Treatment Decisions;135
10.4;Validating Effectiveness in Execution;138
10.5;Moving Ahead;140
10.6;Notes;141
11;Chapter 6: How Do I Manage This?;142
11.1;Governance Operating Model;143
11.2;Cybersecurity Risk Appetite;150
11.3;Cybersecurity Performance Objectives;157
11.4;Moving Ahead;171
11.5;Notes;171
12;Chapter 7: Should This Involve the Whole Organization?;174
12.1;Architectural View;175
12.2;Enterprise Capabilities;185
12.3;Monitoring and Reporting;193
12.4;Metrics;201
12.5;Moving Ahead;206
12.6;Notes;207
13;Chapter 8: How Can We Improve Our Capabilities?;210
13.1;Build a Learning Organization;211
13.2;Improve the Quality of Risk Assessments;214
13.3;Use Organizational Knowledge;220
13.4;Take Action Based on the Risk Assessment;222
13.5;Build Situational Awareness;224
13.6;Conduct Realistic Drills, Tests, and Games;228
13.7;Design of Technical Tests;232
13.8;Move from Controls-Thinking to Capabilities-Thinking;234
13.9;Moving Ahead;236
13.10;Notes;237
14;Chapter 9: What Can We Learn From Losses?;240
14.1;Breaches Provide the Context That Standards Lack;241
14.2;Technology-Focused Resilience Is Just the Beginning;242
14.3;The Learning Organization Revisited;243
14.4;Easier Said Than Done;244
14.5;AntiFragile;245
14.6;Learn, Study Mistakes, and Learn Again;248
14.7;Moving Ahead;249
14.8;Notes;250
15;Chapter 10: So What´s Next?;252
15.1;Complexity and Interconnectedness;252
15.2;Potential Cybersecurity Implications;257
15.3;Emerging Standards;260
15.4;Notes;265
16;Index;268
mehr

Autor

Paul Rohmeyer has extensive industry and academic experience in many areas, including: information systems management, IT audit, information security, business continuity planning, and vendor management. He is a faculty member at the School of Business at Stevens Institute of Technology and has presented and published on information security, decision making, and business continuation. He has provided senior-level guidance to numerous financial institutions in the areas of risk management, information assurance, and network security over the past two decades.




Prior to his consulting career, Paul served as Director of IT for AXA Financial and Director of IT Architecture Planning for SAIC/Bellcore. He has MS and PhD degrees in information management from Stevens Institute of Technology, an MBA in finance from St. Joseph's University, and a BA in economics from Rutgers University. He has achieved the CGEIT (Certified in the Governance of Enterprise IT), PMP (Project Management Professional), and NSA-IAM (US National Security Agency Information Assurance Methodology) credentials.


Jennifer L. Bayuk is a cybersecurity due diligence expert, cybersecurity risk management consultant, and an adjunct professor at Stevens Institute of Technology. She has served in many roles, including: global financial services technology risk management officer, Wall Street chief information security officer, Big 4 information risk management consultant, manager of information technology internal audit, security architect, Bell Labs security software engineer, professor of systems security engineering, private cybersecurity investigator, and expert witness.

Jennifer has written numerous publications on information security management, information technology risk management, information security tools and techniques, cybersecurity forensics, technology-related privacy issues, audit of physical and information systems, security awareness education, and systems security metrics. She has master degrees in computer science and philosophy, and a PhD in systems engineering. Her certifications include CISSP, CISA, CISM, CGEIT, and a New Jersey state private investigator license.