Book description
Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for designing, developing, and implementing a cyber risk management program that addresses your company's specific needs. Ideal for corporate directors, senior executives, security risk practitioners, and auditors at many levels, this guide offers both the strategic insight and tactical guidance you're looking for.
You'll learn how to define and establish a sustainable, defendable, cyber risk management program, and the benefits associated with proper implementation. Cyber risk management experts Brian Allen and Brandon Bapst, working with writer Terry Allan Hicks, also provide advice that goes beyond risk management. You'll discover ways to address your company's oversight obligations as defined by international standards, case law, regulation, and board-level guidance.
This book helps you:
- Understand the transformational changes digitalization is introducing, and new cyber risks that come with it
- Learn the key legal and regulatory drivers that make cyber risk management a mission-critical priority for enterprises
- Gain a complete understanding of four components that make up a formal cyber risk management program
- Implement or provide guidance for a cyber risk management program within your enterprise
Publisher resources
Table of contents
- Preface
- 1. Cybersecurity in the Age of Digital Transformation
-
2. The Cyber Risk Management Program
- The SEC Speaks—and the World Listens
- The Cyber Risk Management Program Framework
- When Risk Management Fails Completely: The Boeing 737 MAX Disasters
- Risk Management Program Applied to the Boeing Disasters
- Benefits of a Security Risk Program
- Board Accountability and Legal Liability
- The Boeing Ruling and Cyber Risk Oversight Accountability
- CISOs in the Line of Fire for Liability
- The Bottom Line
-
3. Agile Governance
- The Uber Hack Cover-Up
- What Does Good Governance Look Like?
- Aligning with the Enterprise Governance Strategy
-
Seven Principles of Agile Governance
- Principle 1: Establish Policies and Processes
- Principle 2: Establish Governance and Roles and Responsibilities Across the “Three Lines Model”
- Principle 3: Align Governance Practices with Existing Risk Frameworks
- Principle 4: Board of Directors and Senior Executives Define Scope
- Principle 5: Board of Directors and Senior Executives Provide Oversight
- Principle 6: Audit Governance Processes
- Principle 7: Align Resources to the Defined Roles and Responsibilities
- The Bottom Line
- 4. Risk-Informed System
-
5. Risk-Based Strategy and Execution
- ChatGPT Shakes the Business World
- AI Risks: Two Tech Giants Choose Two Paths
- Wall Street: Move Fast—or Be Replaced
- The Digital Game Changers Just Keep Coming
- Defining Risk-Based Strategy and Execution
-
Six Principles of Risk-Based Strategy and Execution
- Principle 1: Define Acceptable Risk Thresholds
- Principle 2: Align Strategy and Budget with Approved Risk Thresholds
- Principle 3: Execute to Meet Approved Risk Thresholds
- Principle 4: Monitor on an Ongoing Basis
- Principle 5: Audit Against Risk Thresholds
- Principle 6: Include Third Parties in Risk Treatment Plan
- The Bottom Line
- 6. Risk Escalation and Disclosure
- 7. Implementing the Cyber Risk Management Program
- 8. The CRMP Applied to Operational Risk and Resilience
- 9. AI and Beyond—the Future of Risk Management in a Digitalized World
- Appendix. The Cyber Risk Management Program Framework v1.0
- Index
- About the Authors
Product information
- Title: Building a Cyber Risk Management Program
- Author(s):
- Release date: December 2023
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781098147792
You might also like
book
Cybersecurity Risk Management
Cybersecurity Risk Management In Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework, veteran …
book
Information Security Risk Management for ISO 27001/ISO 27002, third edition
Ideal for risk managers, information security managers, lead implementers, compliance managers and consultants, as well as …
book
Cybersecurity and Third-Party Risk
STRENGTHEN THE WEAKEST LINKS IN YOUR CYBERSECURITY CHAIN Across the world, the networks of hundreds of …
book
Developing Cybersecurity Programs and Policies, 3rd Edition
All the Knowledge You Need to Build Cybersecurity Programs and Policies That Work Clearly presents best …