ABSTRACT

Cyber risk is the highest perceived business risk according to risk managers and corporate insurance experts. Cybersecurity typically is viewed as the boogeyman: it strikes fear into the hearts of non-technical employees. Enterprise Cybersecurity in Digital Business: Building a Cyber Resilient Organization provides a clear guide for companies to understand cyber from a business perspective rather than a technical perspective, and to build resilience for their business.

Written by a world-renowned expert in the field, the book is based on three years of research with the Fortune 1000 and cyber insurance industry carriers, reinsurers, and brokers. It acts as a roadmap to understand cybersecurity maturity, set goals to increase resiliency, create new roles to fill business gaps related to cybersecurity, and make cyber inclusive for everyone in the business. It is unique since it provides strategies and learnings that have shown to lower risk and demystify cyber for each person. With a clear structure covering the key areas of the Evolution of Cybersecurity, Cybersecurity Basics, Cybersecurity Tools, Cybersecurity Regulation, Cybersecurity Incident Response, Forensics and Audit, GDPR, Cybersecurity Insurance, Cybersecurity Risk Management, Cybersecurity Risk Management Strategy, and Vendor Risk Management Strategy, the book provides a guide for professionals as well as a key text for students studying this field.

The book is essential reading for CEOs, Chief Information Security Officers, Data Protection Officers, Compliance Managers, and other cyber stakeholders, who are looking to get up to speed with the issues surrounding cybersecurity and how they can respond. It is also a strong textbook for postgraduate and executive education students in cybersecurity as it relates to business.

part I|68 pages

The Evolution of Cyber Risk

chapter 21|10 pages

Cyber

A business issue

chapter 2|14 pages

Cyber Risk

chapter 3|11 pages

The History of Cybersecurity

chapter 4|10 pages

Cybersecurity Consequences

chapter 5|10 pages

Cybersecurity Trends and Spending

chapter 6|11 pages

Cyber Roles

part II|60 pages

Cyber Basics

chapter 707|8 pages

Attack Surfaces and Digital Asset Inventory

chapter 11|7 pages

Enterprise Cybersecurity Programs

chapter 12|7 pages

Organizational Cyber Maturities

part III|32 pages

Cybersecurity Tools

chapter 13013|12 pages

Cybersecurity Policies

chapter 14|18 pages

Cybersecurity Tools

part IV|70 pages

Cybersecurity Regulation and Frameworks

chapter 16215|20 pages

Us Federal Regulation

chapter 16|20 pages

Us State Regulations

chapter 18|5 pages

Industry Cybersecurity Standards

part V|38 pages

Incident Response, Audit, and Forensics

chapter 23219|5 pages

Cybersecurity Incident Response

chapter 20|14 pages

Digital Forensics Methods

chapter 21|17 pages

Cybersecurity Auditing

part VI|50 pages

Cybersecurity Risk Management

chapter 27022|14 pages

Cybersecurity Financial Exposures

part VII|86 pages

The General Data Protection Regulation (GDPR) and Privacy

chapter 32025|11 pages

GDPR Overview

chapter 26|55 pages

GDPR Articles

chapter 27|8 pages

GDPR Evidence

chapter 28|10 pages

GDPR Requirements

The data privacy impact assessment (DPIA)

part VIII|32 pages

Cybersecurity Risk Strategy

chapter 40629|10 pages

CISO Strategies

chapter 30|20 pages

Cyber in the Boardroom

part IX|32 pages

Cybersecurity Insurance

chapter 43831|7 pages

Cyber Insurance Overview

chapter 32|11 pages

Calculating Limits Adequacy

chapter 33|12 pages

Ransomware Strategies

part X|33 pages

Cyber Vendor Risk Management

chapter 47034|11 pages

Vendor Cyber Risk Overview

chapter 35|13 pages

Vendor Cybersecurity Regulations

chapter |7 pages

The Way Forward