Lyt når som helst, hvor som helst

Nyd den ubegrænsede adgang til tusindvis af spændende e- og lydbøger - helt gratis

  • Lyt og læs så meget du har lyst til
  • Opdag et kæmpe bibliotek fyldt med fortællinger
  • Eksklusive titler + Mofibo Originals
  • Opsig når som helst
Start tilbuddet
DK - Details page - Device banner - 894x1036
Cover for Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions

Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions

Varighed
5T 51M
Sprog
Engelsk
Format
Kategori

Økonomi & Business

Cyber Intelligence-Driven Risk provides a solution to one of the most pressing issues that executives and risk managers face: How can we weave information security into our business decisions to minimize overall business risk?

In today's complex digital landscape, business decisions and cyber event responses have implications for information security that high-level actors may be unable to foresee. What we need is a cybersecurity command center capable of delivering, not just data, but concise, meaningful interpretations that allow us to make informed decisions.

Building, buying, or outsourcing a CI-DR™ program is the answer. In his work with executives at leading financial organizations and with the US military, author Richard O. Moore III has tested and proven this next-level approach to Intelligence and Risk. This book is a guide to: building, buying, or outsourcing a cyber intelligence–driven risk program; understanding the functional capabilities needed to sustain the program; using cyber intelligence to support Enterprise Risk Management; reducing loss from cyber events by building new organizational capacities; and supporting mergers and acquisitions with predictive analytics.

© 2021 Ascent Audio (Lydbog): 9781469082691

Udgivelsesdato

Lydbog: 9. februar 2021

Andre kan også lide...

  1. Building a Cyber Risk Management Program: Evolving Security for the Digital Age
    Building a Cyber Risk Management Program: Evolving Security for the Digital Age Brian Allen
  2. The Art of Attack: Attacker Mindset for Security Professionals
    The Art of Attack: Attacker Mindset for Security Professionals Maxie Reynolds
  3. A Brief History of a Perfect Future: Inventing the world that we can proudly leave our kids by 2050
    A Brief History of a Perfect Future: Inventing the world that we can proudly leave our kids by 2050 Paul B. Carroll
  4. Designing Transformative Experiences: A Toolkit for Leaders, Trainers, Teachers, and other Experience Designers
    Designing Transformative Experiences: A Toolkit for Leaders, Trainers, Teachers, and other Experience Designers Brad McLain
  5. How Big-Tech Barons Smash Innovation—and How to Strike Back
    How Big-Tech Barons Smash Innovation—and How to Strike Back Maurice E. Stucke
  6. How to Measure Anything in Cybersecurity Risk, 2nd Edition
    How to Measure Anything in Cybersecurity Risk, 2nd Edition Douglas W. Hubbard
  7. The Road to Reinvention: How to Drive Disruption and Accelerate Transformation
    The Road to Reinvention: How to Drive Disruption and Accelerate Transformation Josh Linkner
  8. The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework
    The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework Mathieu Gorge
  9. Project Myopia: Why Projects Damage Software #NoProjects
    Project Myopia: Why Projects Damage Software #NoProjects Allan Kelly
  10. Next: Where to Live, What to Buy and Who Will Lead Canada's Future: Where to Live, What to Buy, and Who Will Lead Canada's Future
    Next: Where to Live, What to Buy and Who Will Lead Canada's Future: Where to Live, What to Buy, and Who Will Lead Canada's Future Darrell Bricker
  11. Maxims for Thinking Analytically: The Wisdom of Legendary Harvard Professor Richard Zeckhauser
    Maxims for Thinking Analytically: The Wisdom of Legendary Harvard Professor Richard Zeckhauser Dan Levy
  12. Cybersecutity First Principles
    Cybersecutity First Principles Rick Howard
  13. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies
    CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN
  14. The Rise of the Cobot: Grow Your Business Exponentially with Collaborative Artificial Intelligence
    The Rise of the Cobot: Grow Your Business Exponentially with Collaborative Artificial Intelligence John Rauscher
  15. Haunted Empire: Apple After Steve Jobs
    Haunted Empire: Apple After Steve Jobs Yukari Iwatani Kane
  16. Age of Invisible Machines: A Practical Guide to Creating a Hyperautomated Ecosystem of Intelligent Digital Workers
    Age of Invisible Machines: A Practical Guide to Creating a Hyperautomated Ecosystem of Intelligent Digital Workers Robb Wilson
  17. Ethical Machines: Your Concise Guide to Totally Unbiased, Transparent, and Respectful AI
    Ethical Machines: Your Concise Guide to Totally Unbiased, Transparent, and Respectful AI Reid Blackman
  18. Healthcare Finance: Modern Financial Analysis for Accelerating Biomedical Innovation
    Healthcare Finance: Modern Financial Analysis for Accelerating Biomedical Innovation Andrew W. Lo
  19. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business
    8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
  20. Business Ethics for Better Behavior
    Business Ethics for Better Behavior Jason Brennan
  21. Create the Future: Tactics for Disruptive Thinking
    Create the Future: Tactics for Disruptive Thinking Jeremy Gutsche
  22. Inventor Confidential: The Honest Guide to Profitable Inventing
    Inventor Confidential: The Honest Guide to Profitable Inventing Warren Tuttle
  23. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions
    Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
  24. Trustworthy AI: A Business Guide for Navigating Trust and Ethics in AI
    Trustworthy AI: A Business Guide for Navigating Trust and Ethics in AI Beena Ammanath
  25. You Only Have to Be Right Once: The Unprecedented Rise of the Instant Tech Billionaires
    You Only Have to Be Right Once: The Unprecedented Rise of the Instant Tech Billionaires Randall Lane
  26. Enterprise Artificial Intelligence Transformation
    Enterprise Artificial Intelligence Transformation Rashed Haq
  27. Cynicism
    Cynicism Ansgar Allen
  28. Web3: Charting the Internet's Next Economic and Cultural Frontier
    Web3: Charting the Internet's Next Economic and Cultural Frontier Alex Tapscott
  29. Trade is Not a Four-Letter Word: How Six Everyday Products Make the Case for Trade
    Trade is Not a Four-Letter Word: How Six Everyday Products Make the Case for Trade Fred P. Hochberg
  30. The Phoenix Economy: Work, Life, and Money in the New Not Normal
    The Phoenix Economy: Work, Life, and Money in the New Not Normal Felix Salmon
  31. Curve Benders: How Strategic Relationships Can Power Your Non-linear Growth in the Future of Work
    Curve Benders: How Strategic Relationships Can Power Your Non-linear Growth in the Future of Work David Nour
  32. The End of Cheap China: Economic and Cultural Trends That Will Disrupt the World
    The End of Cheap China: Economic and Cultural Trends That Will Disrupt the World Shaun Rein
  33. The Ostrich Paradox: Why We Underprepare for Disasters
    The Ostrich Paradox: Why We Underprepare for Disasters Howard Kunreuther
  34. Certified Information Security Manager CISM Study Guide
    Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
  35. The Cost-Benefit Revolution
    The Cost-Benefit Revolution Cass R. Sunstein
  36. TouchPoints: Creating Powerful Leadership Connections in the Smallest of Moments
    TouchPoints: Creating Powerful Leadership Connections in the Smallest of Moments Mette Norgaard
  37. Billionaires in World Politics
    Billionaires in World Politics Peter Hagel
  38. The Messenger: Moderna, the Vaccine, and the Business Gamble That Changed the World
    The Messenger: Moderna, the Vaccine, and the Business Gamble That Changed the World Peter Loftus
  39. Innovation On Tap: Stories of Entrepreneurship from the Cotton Gin to Broadway's Hamilton
    Innovation On Tap: Stories of Entrepreneurship from the Cotton Gin to Broadway's Hamilton Eric B. Schultz
  40. Competition Overdose: How Free Market Mythology Transformed Us from Citizen Kings to Market Servants
    Competition Overdose: How Free Market Mythology Transformed Us from Citizen Kings to Market Servants Maurice E. Stucke
  41. The Great Persuasion: Reinventing Free Markets Since the Depression
    The Great Persuasion: Reinventing Free Markets Since the Depression Angus Burgin
  42. The DevSecOps Playbook: Deliver Continuous Security at Speed
    The DevSecOps Playbook: Deliver Continuous Security at Speed Sean D. Mack
  43. Corporate Canaries: Avoid Business Disasters with a Coal Miner's Secrets
    Corporate Canaries: Avoid Business Disasters with a Coal Miner's Secrets Gary Sutton
  44. Design Any Disaster: The Revolutionary Blueprint to Master Your Next Crisis or Emergency
    Design Any Disaster: The Revolutionary Blueprint to Master Your Next Crisis or Emergency Patrick Hardy
  45. Born Digital: The Story of a Distracted Generation
    Born Digital: The Story of a Distracted Generation Robert Wigley
  46. The Power Resilience: How the Best Companies Manage the Unexpected
    The Power Resilience: How the Best Companies Manage the Unexpected Yossi Sheffi
  47. Think Better: Unlocking the Power of Reason
    Think Better: Unlocking the Power of Reason Ulrich L. Lehner
  48. The Energy Wars – The Future of Renewable Energy & Sustainability: How Solar, Wind, and Nuclear Are Shaping the Battle for a Greener Future
    The Energy Wars – The Future of Renewable Energy & Sustainability: How Solar, Wind, and Nuclear Are Shaping the Battle for a Greener Future James Nemeth
  49. Tech Agnostic: How Technology Became the World’s Most Powerful Religion, and Why It Desperately Needs a Reformation
    Tech Agnostic: How Technology Became the World’s Most Powerful Religion, and Why It Desperately Needs a Reformation Greg M. Epstein
  50. Why The New Deal Matters
    Why The New Deal Matters Eric Rauchway
  51. The New Technology Elite: How Great Companies Optimize Both Technology Consumption and Production
    The New Technology Elite: How Great Companies Optimize Both Technology Consumption and Production Vinnie Mirchandani
  52. Quantum Computing For Dummies
    Quantum Computing For Dummies whurley
  53. Data Driven: How Performance Analytics Delivers Extraordinary Sales Results
    Data Driven: How Performance Analytics Delivers Extraordinary Sales Results Jenny Dearborn
  54. Startup Boards: A Field Guide to Building and Leading an Effective Board of Directors
    Startup Boards: A Field Guide to Building and Leading an Effective Board of Directors Brad Feld
  55. The Competitive Intelligence Playbook: How to Build, Manage, and Optimize a Competitive Intelligence Program
    The Competitive Intelligence Playbook: How to Build, Manage, and Optimize a Competitive Intelligence Program Fouad Benyoub
  56. Haptics
    Haptics Lynette Jones
  57. You Can't Order Change: Lessons from Jim McNerney's Turnaround at Boeing
    You Can't Order Change: Lessons from Jim McNerney's Turnaround at Boeing Peter S. Cohan
  58. Winning at the Acquisition Game : Tools, Templates and Best Practices Across the M&A Process: Tools, Templates, and Best Practices Across the M&A Process
    Winning at the Acquisition Game : Tools, Templates and Best Practices Across the M&A Process: Tools, Templates, and Best Practices Across the M&A Process Timothy Galpin
  59. The Tyranny of Dead Ideas: Revolutionary Thinking for a New Age of Prosperity
    The Tyranny of Dead Ideas: Revolutionary Thinking for a New Age of Prosperity Matt Miller
  60. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity
    Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
  61. Critical Thinking Growth for Problem Solving and Decision Making: Create a Positive Mind Set for Thinking
    Critical Thinking Growth for Problem Solving and Decision Making: Create a Positive Mind Set for Thinking Eric J Kelly
  62. Practical Portfolio Performance Measurement and Attribution
    Practical Portfolio Performance Measurement and Attribution Carl R. Bacon
  63. Understandable Economics: Because Understanding Our Economy Is Easier Than You Think and More Important Than You Know
    Understandable Economics: Because Understanding Our Economy Is Easier Than You Think and More Important Than You Know Howard Yaruss
  64. Behavioural Economics: Psychology, neuroscience, and the human side of economics
    Behavioural Economics: Psychology, neuroscience, and the human side of economics David Orrell
  65. Catching Up to Crypto: Your Guide to Bitcoin and the New Digital Economy
    Catching Up to Crypto: Your Guide to Bitcoin and the New Digital Economy Ben Armstrong
  66. What You Don't Know: Successfully Lead A Software Project ... Without Tech Expertise
    What You Don't Know: Successfully Lead A Software Project ... Without Tech Expertise Dr. Will Bralick
  67. Practical Innovation in Government: How Front-Line Leaders Are Transforming Public-Sector Organizations
    Practical Innovation in Government: How Front-Line Leaders Are Transforming Public-Sector Organizations Alan G Robinson
  68. Trading at the Speed of Light: How Ultrafast Algorithms Are Transforming Financial Markets
    Trading at the Speed of Light: How Ultrafast Algorithms Are Transforming Financial Markets Donald MacKenzie
  69. Win the Game of Googleopoly: Unlocking the Secret Strategy of Search Engines
    Win the Game of Googleopoly: Unlocking the Secret Strategy of Search Engines Sean V. Bradley
  70. RMF ISSO: Foundations (Guide): NIST 800 Risk Management Framework For Cybersecurity Professionals
    RMF ISSO: Foundations (Guide): NIST 800 Risk Management Framework For Cybersecurity Professionals Brown Brown
  71. Inevitable: Inside the Messy, Unstoppable Transition to Electric Vehicles
    Inevitable: Inside the Messy, Unstoppable Transition to Electric Vehicles Mike Colias
  72. All You Can Pay: How Companies Use Our Data to Empty Our Wallets
    All You Can Pay: How Companies Use Our Data to Empty Our Wallets Anna Bernasek
  73. Doing AI: A Business-Centric Examination of AI Culture, Goals, and Values
    Doing AI: A Business-Centric Examination of AI Culture, Goals, and Values Richard Heimann
  74. Confidence Game: How Hedge Fund Manager Bill Ackman Called Wall Street's Bluff
    Confidence Game: How Hedge Fund Manager Bill Ackman Called Wall Street's Bluff Christine S. Richard
  75. ChatGPT for Nonfiction Authors: How AI Can Improve Your Writing
    ChatGPT for Nonfiction Authors: How AI Can Improve Your Writing Acquilia Awa
  76. Average Joe: Be the Silicon Valley Tech Genius
    Average Joe: Be the Silicon Valley Tech Genius Shawn Livermore
  77. The Five Forces That Change Everything: How Technology is Shaping Our Future
    The Five Forces That Change Everything: How Technology is Shaping Our Future Steven S. Hoffman
  78. Ludicrous: The Unvarnished Story of Tesla Motors
    Ludicrous: The Unvarnished Story of Tesla Motors Edward Niedermeyer
  79. Long Term Game: How To Build A Video Games Company
    Long Term Game: How To Build A Video Games Company Joakim Achrén
  80. Money Games: The Inside Story of How American Dealmakers Saved Korea's Most Iconic Bank
    Money Games: The Inside Story of How American Dealmakers Saved Korea's Most Iconic Bank Weijian Shan
  81. Distrust: Big Data, Data-Torturing, and the Assault on Science
    Distrust: Big Data, Data-Torturing, and the Assault on Science Gary Smith
  82. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security
    The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
  83. Tipping Sacred Cows: Kick the Bad Work Habits that Masquerade as Virtues
    Tipping Sacred Cows: Kick the Bad Work Habits that Masquerade as Virtues Jake Breeden
  84. Digital Resilience: Is Your Company Ready for the Next Cyber Threat?
    Digital Resilience: Is Your Company Ready for the Next Cyber Threat? Ray A. Rothrock
  85. Anatomy of a Ponzi: Scams Past and Present
    Anatomy of a Ponzi: Scams Past and Present Colleen Cross
  86. Everybody Wants to Rule the World: Surviving and Thriving in a World of Digital Giants
    Everybody Wants to Rule the World: Surviving and Thriving in a World of Digital Giants R "Ray" Wang
  87. The Failure of Risk Management: Why It's Broken and How to Fix It 2nd Edition
    The Failure of Risk Management: Why It's Broken and How to Fix It 2nd Edition Douglas W. Hubbard

Vælg dit abonnement

  • Over 1 million titler

  • Download og nyd titler offline

  • Eksklusive titler + Mofibo Originals

  • Børnevenligt miljø (Kids Mode)

  • Det er nemt at opsige når som helst

Den mest populære

Premium

For dig som lytter og læser ofte.

129 kr. /måned

7 dage gratis
  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Start tilbuddet

Unlimited

For dig som lytter og læser ubegrænset.

159 kr. /måned

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Start tilbuddet

Family

For dig som ønsker at dele historier med familien.

Fra 179 kr. /måned

7 dage gratis
  • Fri lytning til podcasts

  • Kun 39 kr. pr. ekstra konto

  • Ingen binding

Dig + 1 familiemedlem2 konti

179 kr. /måned

Start tilbuddet

Flex

For dig som vil prøve Mofibo.

89 kr. /måned

7 dage gratis
  • Gem op til 100 ubrugte timer

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Prøv gratis