Amazon cover image
Image from Amazon.com

Cyber security management : a governance, risk and compliance framework / Peter Trim, Yang-Im Lee.

By: Contributor(s): Material type: TextTextPublisher: Burlington, VT : Gower, 2020Description: xxii, 240 pages : illustrations ; 25 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9780367606169
Subject(s): DDC classification:
  • 005.8076 TR.C 2020 23
Contents:
Introduction and background to the research -- Sequence-of-events model -- Organizational strategic governance framework -- Business continuity management planning framework -- Communication risk management strategy -- Risk assessment policy and its strategic context -- Resilience policy and strategy mapping -- Integrated resilience management model -- Integrated management model and system -- Integrated governance mechanism -- Threat identification -- Competitor and marketing analysis -- Governance and compliance decision making process -- Integrated security mechanism -- Modified and Extended Generic Cyber Security Management Model (MEGCSMM) and strategic management framework, and project liaison team management -- Recommendations for counteracting cyber threats.
Summary: This book includes a sequence-of-events model; an organizational governance framework; a business continuity management planning framework; a multi-cultural communication model; a cyber security management model and strategic management framework; an integrated governance mechanism; an integrated resilience management model; an integrated management model and system; a communication risk management strategy; and recommendations for counteracting a range of cyber threats. It simplifies complex material and provides a multi-disciplinary perspective and an explanation and interpretation of how managers can manage cyber threats in a pro-active manner and work towards counteracting cyber threats both now and in the future. --Edited summary from book.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode
Books Books The Knowledge Hub Library Computing 005.8076 TR.C 2020 (Browse shelf(Opens below)) Not For Loan 211409
Books Books The Knowledge Hub Library Computing 005.8076 TR.C 2020 (Browse shelf(Opens below)) Not For Loan 211410
Books Books The Knowledge Hub Library Computing 005.8076 TR.C 2020 (Browse shelf(Opens below)) Not For Loan 211411
Books Books The Knowledge Hub Library Computing 005.8076 TR.C 2020 (Browse shelf(Opens below)) Not For Loan 211412

Includes bibliographical references and index.

Introduction and background to the research -- Sequence-of-events model -- Organizational strategic governance framework -- Business continuity management planning framework -- Communication risk management strategy -- Risk assessment policy and its strategic context -- Resilience policy and strategy mapping -- Integrated resilience management model -- Integrated management model and system -- Integrated governance mechanism -- Threat identification -- Competitor and marketing analysis -- Governance and compliance decision making process -- Integrated security mechanism -- Modified and Extended Generic Cyber Security Management Model (MEGCSMM) and strategic management framework, and project liaison team management -- Recommendations for counteracting cyber threats.

This book includes a sequence-of-events model; an organizational governance framework; a business continuity management planning framework; a multi-cultural communication model; a cyber security management model and strategic management framework; an integrated governance mechanism; an integrated resilience management model; an integrated management model and system; a communication risk management strategy; and recommendations for counteracting a range of cyber threats. It simplifies complex material and provides a multi-disciplinary perspective and an explanation and interpretation of how managers can manage cyber threats in a pro-active manner and work towards counteracting cyber threats both now and in the future. --Edited summary from book.

There are no comments on this title.

to post a comment.