000 03945nam a22004334u 4500
001 200467406
003 Wiley
005 20260227141151.0
007 cr nn 008mam|a
008 240329t2024||||xxu fs| |0|| 0|eng||
020 _a9781394250226
_qelectronic
024 7 _a10.1002/9781394250226
_2doi
040 _aTR-AnTOB
_beng
_erda
_cTR-AnTOB
041 0 _aeng
050 0 0 _aHD30.38
_b.E34 2024
090 _aHD30.38
_b.E34 2024EBK
100 1 _aEdwards, Jason
_eauthor
245 1 4 _aThe cybersecurity guide to governance, risk, and compliance /
_h[electronic resource]
_cJason Edwards, Griffin Weaver
264 1 _aHoboken, NJ :
_bWiley,
_c2024.
300 _a1 online resource (xviii, 638 pages)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_2rdaft
347 _bPDF
520 _aThe Cybersecurity Guide to Governance, Risk, and Compliance Understand and respond to a new generation of cybersecurity threats Cybersecurity has never been a more significant concern of modern businesses, with security breaches and confidential data exposure as potentially existential risks. Managing these risks and maintaining compliance with agreed-upon cybersecurity policies is the focus of Cybersecurity Governance and Risk Management. This field is becoming ever more critical as a result. A wide variety of different roles and categories of business professionals have an urgent need for fluency in the language of cybersecurity risk management. The Cybersecurity Guide to Governance, Risk, and Compliance meets this need with a comprehensive but accessible resource for professionals in every business area. Filled with cutting-edge analysis of the advanced technologies revolutionizing cybersecurity, increasing key risk factors at the same time, and offering practical strategies for implementing cybersecurity measures, it is a must-own for CISOs, boards of directors, tech professionals, business leaders, regulators, entrepreneurs, researchers, and more. The Cybersecurity Guide to Governance, Risk, and Compliance also covers: Over 1300 actionable recommendations found after each section Detailed discussion of topics including AI, cloud, and quantum computing More than 70 ready-to-use KPIs and KRIs "This guide’s coverage of governance, leadership, legal frameworks, and regulatory nuances ensures organizations can establish resilient cybersecurity postures. Each chapter delivers actionable knowledge, making the guide thorough and practical." —GARY McALUM, CISO "This guide represents the wealth of knowledge and practical insights that Jason and Griffin possess. Designed for professionals across the board, from seasoned cybersecurity veterans to business leaders, auditors, and regulators, this guide integrates the latest technological insights with governance, risk, and compliance (GRC)". —WIL BENNETT, CISO
650 4 _aCommunication System Security
650 4 _aNetworking / Security
650 4 _aCorporate Governance
_975036
653 0 0 _aCybersecurity; Governance; Risk Management; Compliance; GRC; Leadership; Artificial Intelligence (A.I.); Cloud Computing Security; Quantum Computing Security; Audit; Regulatory Frameworks; Incident Response and Recovery; Third-Party and Vendor Management; Technology Design and Security Integration; Legal; Privacy; Cyber Insurance
655 7 _aElectronic books
_2local
_92032
700 1 _aWeaver, Griffin
_eauthor
776 0 8 _iPrinted edition:
_z9781394250196
856 4 0 _uhttps://doi.org/10.1002/9781394250226
_aWiley Online Library
856 4 0 _uhttps://onlinelibrary.wiley.com/action/showBook?doi=10.1002%2F9781394250226
_aWiley Online Library
856 4 2 _3Cover Image
_uhttps://onlinelibrary.wiley.com/cms/asset/6521cbe3-9da2-4a87-9b04-29a263f64a11/9781394250226.cover.gif
_aWiley Online Library
942 _2lcc
_cEBK
999 _c200467406
_d85618