Optimal Spending on Cybersecurity Measures
- Available for pre-order. Item will ship after July 8, 2021
This book explores the strategic decisions made by organizations when implementing cybersecurity controls, leveraging economic models and theories from the economics of information security and risk management frameworks.
Based on unique and distinct research completed within the field of risk management and information security, this book provides insight into organizational risk management processes utilized in determining cybersecurity investments. It looks at how theoretical models and frameworks rely on either specific scenarios or controlled conditions, and how decisions on cybersecurity spending within organizations, specifically the funding available in comparison to the recommended security measures necessary for compliance, vary depending on stakeholders. As the trade-off between the costs of implementing a security measure and the benefit derived from the implementation of the security control is not easily measured, a business leader’s decision to fund security measures may be biased. The author presents an innovative approach to assess cyber security initiatives with a risk management perspective and leverages a data-centric focus on the evolution of cyber-attacks.
This book is ideal for business school students and technology professionals with an interest in risk management.
Table of Contents
Preface; Chapter 1: Introduction; Chapter 2: Enterprise Risk Management Framework; Chapter 3: Alignment with the Enterprise Risk Management Framework; Chapter 4: Risk Management Practice – Vulnerability Management; Chapter 5: Risk Management Practice – System Development Lifecycle; Chapter 6: Risk Management Practice – Business Continuity Management; Chapter 7: Cybersecurity Risk Management Framework; Chapter 8: Case Studies; References
Tara Kissoon is a multi-certified I.T. Risk & Security Leader with 20+ years of technology experience, 13 years of experience in the financial services industry. She brings continued success on Technology, I.T. Risk and Information Security programs and projects within large organizations. She is acknowledged as a leader, security architect and trusted advisor with a talent for working with crossfunctional teams to achieve short and long-term business objectives.