Home Page Icon
Home Page
Table of Contents for
Part 1 – Identifying Cyber Risks
Close
Part 1 – Identifying Cyber Risks
by Rupert Kendrick
Cyber Risks for Business Professionals
Cover
Title Page
Copyright Page
Foreword
Preface
About the Author
Acknowledgements
Contents
Part 1 – Identifying Cyber Risks
Chapter 1: Setting the Scene
The importance of IT
The importance of the Internet
Internet risk
Internet risk implications
The importance of governance
Managing risk
The need for governance principles
Chapter 2: Technology Risks
Communications risk
Information security risk
Business continuity risk
IT outsourcing risks
Social networking risks
Chapter 3: Legal Compliance Risks
Website management
Consumers and services
Jurisdiction and applicable laws
Internet abuse
Monitoring and surveillance
Social networking
IT outsourcing risks
Chapter 4: Operational Risks
Employee use of e-mail
Employee use of the Internet
Website management
Delivery of electronic services
Miscellaneous
Part 2 – Risk Management Strategies
Chapter 5: The Need for Governance
Strategy
Corporate governance
IT governance
Project governance
Risk
Chapter 6: Assessing Risk
Risk concepts
Approaching risk assessment
Objectives and benefits
The risk assessment
The risk control plan
The risk register
Risk assessment techniques – ISO/IEC 31010: 2009
Chapter 7: Risk Management Strategies
Senior management
Risk management principles
Objectives
Benefits
Cyber risk management framework
Standards certification
Risk compliance provisions
Part 3 – Cyber Risk Solutions
Chapter 8: Technology Solutions
Communications
Information and data security
Networks
Identity and access management
General information and data control
World Wide Web controls
Online payment systems
Business continuity
Traditional outsourcing
Web 2.0 security
Chapter 9: Compliance Solutions
Website management
Clients and services
Jurisdiction and applicable law
Internet abuse
Monitoring and surveillance
Chapter 10: Operational Solutions
Internet policies
Specific policies
Cyberliability insurance
Chapter 11: The Cybersecure Entity
Strategic and operational changes
Managing change
The cybersecure organisation
Governance implications
Integrating the cyber risk team
Conclusion
ITG Resources
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Contents
Next
Next Chapter
Chapter 1: Setting the Scene
PART 1 – IDENTIFYING CYBER RISKS
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset