did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781119308805

The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)

by
  • ISBN13:

    9781119308805

  • ISBN10:

    1119308801

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2017-05-01
  • Publisher: Jossey-Bass

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

List Price: $90.66 Save up to $37.62
  • Rent Book $53.04
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE
    USUALLY SHIPS IN 24-48 HOURS
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

Supplemental Materials

What is included with this book?

Summary

Actionable guidance and expert perspective for real-world cybersecurity

The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world situations, and cross-functional solutions for enterprise-wide improvement. Beginning with an overview of counter-cyber evolution, the discussion quickly turns practical with design and implementation guidance for the range of capabilities expected of a robust cyber risk management system that is integrated with the enterprise risk management (ERM) system. Expert contributors from around the globe weigh in on specialized topics with tools and techniques to help any type or size of organization create a robust system tailored to its needs. Chapter summaries of required capabilities are aggregated to provide a new cyber risk maturity model used to benchmark capabilities and to road-map gap-improvement.

Cyber risk is a fast-growing enterprise risk, not just an IT risk. Yet seldom is guidance provided as to what this means. This book is the first to tackle in detail those enterprise-wide capabilities expected by Board, CEO and Internal Audit, of the diverse executive management functions that need to team up with the Information Security function in order to provide integrated solutions.

  • Learn how cyber risk management can be integrated to better protect your enterprise
  • Design and benchmark new and improved practical counter-cyber capabilities
  • Examine planning and implementation approaches, models, methods, and more
  • Adopt a new cyber risk maturity model tailored to your enterprise needs

The need to manage cyber risk across the enterprise—inclusive of the IT operations—is a growing concern as massive data breaches make the news on an alarmingly frequent basis. With a cyber risk management system now a business-necessary requirement, practitioners need to assess the effectiveness of their current system, and measure its gap-improvement over time in response to a dynamic and fast-moving threat landscape. The Cyber Risk Handbook brings the world's best thinking to bear on aligning that system to the enterprise and vice-a-versa. Every functional head of any organization must have a copy at-hand to understand their role in achieving that alignment.

Author Biography

DOMENIC ANTONUCCI is a practicing international chief risk officer overseeing cybersecurity and a former counter-terrorist officer. Based in Dubai, UAE, he specializes in bringing organizations "up the risk maturity curve." He is the content author for the Benchmarker™ Risk Maturity Model software and author of Risk Maturity Models.

Table of Contents

Foreword by Ron Hale xxiii

About the Editor xxxi

List of Contributors xxxiii

Acknowledgments xxxv

CHAPTER 1 Introduction 1
Domenic Antonucci, Editor and Chief Risk Officer, Australia

The CEO under Pressure 1

Toward an Effectively Cyber Risk–Managed Organization 3

Handbook Structured for the Enterprise 4

Handbook Structure, Rationale, and Benefits 7

Which Chapters Are Written for Me? 8

CHAPTER 2 Board Cyber Risk Oversight 11
Tim J. Leech, Risk Oversight Solutions Inc., Canada Lauren C. Hanlon, Risk Oversight Solutions Inc., Canada

What Are Boards Expected to Do Now? 11

What Barriers to Action Will Well-Intending Boards Face? 13

What Practical Steps Should Boards Take Now to Respond? 16

Cybersecurity—The Way Forward 20

About Risk Oversight Solutions Inc. 21

About Tim J. Leech, FCPA, CIA, CRMA, CFE 21

About Lauren C. Hanlon, CPA, CIA, CRMA, CFE 21

CHAPTER 3 Principles Behind Cyber Risk Management 23
RIMS, the risk management society™ Carol Fox, Vice President, Strategic Initiatives at RIMS, USA

Cyber Risk Management Principles Guide Actions 23

Meeting Stakeholder Needs 25

Covering the Enterprise End to End 26

Applying a Single, Integrated Framework 27

Enabling a Holistic Approach 28

Separating Governance from Management 31

Conclusion 31

About RIMS 32

About Carol Fox 32

CHAPTER 4 Cybersecurity Policies and Procedures 35
The Institute for Risk Management (IRM) Elliot Bryan, IRM and Willis Towers Watson, UK 
Alexander Larsen, IRM, and President of Baldwin Global Risk Services Ltd., UK

Social Media Risk Policy 35

Ransomware Risk Policies and Procedures 41

Cloud Computing and Third-Party Vendors 45

Big Data Analytics 50

The Internet of Things 53

Mobile or Bring Your Own Devices (BYOD) 55

Conclusion 60

About IRM 64

About Elliot Bryan, BA (Hons), ACII 65

About Alexander Larsen, FIRM, President of Baldwin Global Risk Services 65

CHAPTER 5 Cyber Strategic Performance Management 67
McKinsey & Company
James M. Kaplan, Partner, McKinsey & Company, New York, USA Jim Boehm, Consultant, McKinsey & Company, Washington, USA

Pitfalls in Measuring Cybersecurity Performance 68

Cybersecurity Strategy Required to Measure Cybersecurity Performance 69

Creating an Effective Cybersecurity Performance Management System 72

Conclusion 77

About McKinsey Company 78

About James Kaplan 78

About Jim Boehm 79

CHAPTER 6 Standards and Frameworks for Cybersecurity 81
Stefan A. Deutscher, Principal, Boston Consulting Group (BCG), Berlin Germany
William Yin, Senior Partner and Managing Director, Boston Consulting Group (BCG), Hong Kong

Putting Cybersecurity Standards and Frameworks in Context 81

Commonly Used Frameworks and Standards (a Selection) 84

Constraints on Standards and Frameworks 93

Good Practice Consistently Applied 93

Conclusion 94

About Boston Consulting Group (BCG) 95

About William Yin 96

About Dr. Stefan A. Deutscher 96

CHAPTER 7 Identifying, Analyzing, and Evaluating Cyber Risks 97
Information Security Forum (ISF)
Steve Durbin, Managing Director, Information Security Forum Ltd.

The Landscape of Risk 97

The People Factor 98

A Structured Approach to Assessing and Managing Risk 100

Security Culture 101

Regulatory Compliance 102

Maturing Security 103

Prioritizing Protection 104

Conclusion 104

About the Information Security Forum (ISF) 106

About Steve Durbin 106

CHAPTER 8 Treating Cyber Risks 109
John Hermans, Cyber Lead Partner Europe, Middle East, and Africa at KPMG, The Netherlands
Ton Diemont, Senior Manager at KPMG, The Netherlands

Introduction 109

Treating Cybersecurity Risk with the Proper Nuance in Line with an Organization’s Risk Profile 110

Determining the Cyber Risk Profile 111

Treating Cyber Risk 112

Alignment of Cyber Risk Treatment 114

Practicing Cyber Risk Treatment 115

Conclusion 119

About KPMG 120

About John Hermans 121

About Ton Diemont 121

CHAPTER 9 Treating Cyber Risks Using Process Capabilities 123
ISACA
Todd Fitzgerald, CISO and ISACA, USA

Cybersecurity Processes Are the Glue That Binds 123

No Intrinsic Motivation to Document 124

Leveraging ISACA COBIT 5 Processes 125

COBIT 5 Domains Support Complete Cybersecurity Life Cycle 137

Conclusion 139

About ISACA 140

About Todd Fitzgerald 141

CHAPTER 10 Treating Cyber Risks—Using Insurance and Finance 143
Aon Global Cyber Solutions
Kevin Kalinich, Esq., Aon Risk Solutions Global Cyber Insurance Practice Leader, USA

Tailoring a Quantifi ed Cost-Benefi t Model 143

Planning for Cyber Risk Insurance 149

The Risk Manager’s Perspective on Planning for Cyber Insurance 150

Cyber Insurance Market Constraints 152

Conclusion 154

About Aon 157

About Kevin Kalinich, Esq. 158

CHAPTER 11 Monitoring and Review Using Key Risk Indicators (KRIs) 159
Ann Rodriguez, Managing Partner, Wability, Inc., USA

Definitions 160

KRI Design for Cyber Risk Management 160

Conclusion 169

About Wability 169

About Ann Rodriguez 170

CHAPTER 12 Cybersecurity Incident and Crisis Management 171
CLUSIF Club de la Sécurité de l’Information Français Gérôme Billois, CLUSIF Administrator and Board Member Cybersecurity at Wavestone Consultancy, France

Cybersecurity Incident Management 171

Cybersecurity Crisis Management 174

Conclusion 182

About CLUSIF 183

About Gérôme Billois, CISA, CISSP and ISO27001 Certifi ed 183

About Wavestone 183

CHAPTER 13 Business Continuity Management and Cybersecurity 185
Marsh
Sek Seong Lim, Marsh Risk Consulting Business Continuity Leader for Asia, Singapore

Good International Practices for Cyber Risk Management and Business Continuity 186

Embedding Cybersecurity Requirements in BCMS 188

Developing and Implementing BCM Responses for Cyber Incidents 189

Conclusion 190

Appendix: Glossary of Key Terms 191

About Marsh 191

About Marsh Risk Consulting 192

About Sek Seong Lim, CBCP, PMC 192

CHAPTER 14 External Context and Supply Chain 193
Supply Chain Risk Leadership Council (SCRLC) 
Nick Wildgoose, Board Member and ex-Chairperson of SCRLC, and Zurich Insurance Group, UK

External Context 194

Building Cybersecurity Management Capabilities from an External Perspective 200

Measuring Cybersecurity Management Capabilities from an External Perspective 204

Conclusion 204

About the SCRLC 205

About Nick Wildgoose, BA (Hons), FCA, FCIPS 205

CHAPTER 15 Internal Organization Context 207
Domenic Antonucci, Editor and Chief Risk Offi cer, Australia
Bassam Alwarith, Head of the National Digitization Program, Ministry of Economy and Planning, Saudi Arabia

The Internal Organization Context for Cybersecurity 207

Tailoring Cybersecurity to Enterprise Exposures 209

Conclusion 240

About Domenic Antonucci 241

About Bassam Alwarith 241

CHAPTER 16 Culture and Human Factors 243
Avinash Totade, ISACA Past President UAE Chapter and Management Consultant, UAE
Sandeep Godbole, ISACA Past President Pune Chapter, India

Organizations as Social Systems 243

Human Factors and Cybersecurity 246

Training 248

Frameworks and Standards 249

Technology Trends and Human Factors 250

Conclusion 252

About ISACA 253

About Avinash Totade 253

About Sandeep Godbole 254

CHAPTER 17 Legal and Compliance 255
American Bar Association Cybersecurity Legal Task Force
Harvey Rishikof, Chair, Advisory Committee to the Standing Committee on Law and National Security, USA
Conor Sullivan, Law Clerk for the Standing Committee on National Security, USA

European Union and International Regulatory Schemes 255

U.S. Regulations 258

Counsel’s Advice and “Boom” Planning 261

Conclusion 266

About the Cybersecurity Legal Task Force 269

About Harvey Rishikof 269

About Conor Sullivan 270

CHAPTER 18 Assurance and Cyber Risk Management 271
Stig J. Sunde, Senior Internal Auditor (ICT), Emirates Nuclear Energy Corporation (ENEC), UAE

Cyber Risk Is Ever Present 271

What the Internal Auditor Expects from an Organization Managing Its Cyber Risks Effectively 272

How to Deal with Two Differing Assurance Maturity Scenarios 277

Combined Assurance Reporting by ERM Head 278

Conclusion 278

About Stig Sunde, CISA, CIA, CGAP, CRISC, IRM Cert. 280

CHAPTER 19 Information Asset Management for Cyber 281
Booz Allen Hamilton
Christopher Ling, Executive Vice President, Booz Allen Hamilton, USA

The Invisible Attacker 281

A Troubling Trend 282

Thinking Like a General 283

The Immediate Need—Best Practices 283

Cybersecurity for the Future 284

Time to Act 286

Conclusion 286

About Booz Allen Hamilton 287

About Christopher Ling 287

CHAPTER 20 Physical Security 289
Radar Risk Group
Inge Vandijck, CEO, Radar Risk Group, Belgium
Paul Van Lerberghe, CTO, Radar Risk Group, Belgium

Tom Commits to a Plan 290

Get a Clear View on the Physical Security Risk Landscape and the Impact on Cybersecurity 291

Manage or Review the Cybersecurity Organization 294

Design or Review Integrated Security Measures 295

Reworking the Data Center Scenario 299

Calculate or Review Exposure to Adversary Attacks 302

Optimize Return on Security Investment 305

Conclusion 306

About Radar Risk Group 307

About Inge Vandijck 307

About Paul Van Lerberghe 307

CHAPTER 21 Cybersecurity for Operations and Communications 309
EY
Chad Holmes, Principal, Cybersecurity, Ernst & Young LLP (EY US)
James Phillippe, Principal, Cybersecurity, Ernst & Young LLP (EY US)

Do You Know What You Do Not Know? 309

Threat Landscape—What Do You Know About Your Organization Risk and Who Is Targeting You? 310

Data and Its Integrity—Does Your Risk Analysis Produce Insight? 310

Digital Revolution—What Threats Will Emerge as Organizations Continue to Digitize? 311

Changes—How Will Your Organization or Operational Changes Affect Risk? 312

People—How Do You Know Whether an Insider or Outsider Presents a Risk? 312

What’s Hindering Your Cybersecurity Operations? 312

Challenges from Within 313

What to Do Now 313

Conclusion 318

About EY 319

About Chad Holmes 319

About James Phillippe 319

CHAPTER 22 Access Control 321
PwC Sidriaan de Villiers, Partner—Africa Cybersecurity Practice, PwC South Africa

Taking a Fresh Look at Access Control 321

Organization Requirements for Access Control 322

User Access Management 323

User Responsibility 327

System and Application Access Control 327

Mobile Devices 329

Teleworking 331

Other Considerations 332

Conclusion 333

About PwC 334

About Sidriaan de Villiers, PwC Partner South Africa 334

CHAPTER 23 Cybersecurity Systems: Acquisition, Development, and Maintenance 335
Deloitte
Michael Wyatt, Managing Director, Cyber Risk Services, Deloitte Advisory, USA

Build, Buy, or Update: Incorporating Cybersecurity Requirements and Establishing Sound Practices 336

Specific Considerations 342

Conclusion 344

About Deloitte Advisory Cyber Risk Services 346

About Michael Wyatt 346

CHAPTER 24 People Risk Management in the Digital Age 347
Airmic
Julia Graham, Deputy CEO and Technical Director at Airmic, UK

Rise of the Machines 347

Enterprise-Wide Risk Management 348

Tomorrow’s Talent 350

Crisis Management 354

Risk Culture 355

Conclusion 356

About Airmic 358

About Julia Graham 358

CHAPTER 25 Cyber Competencies and the Cybersecurity Offi cer 359
Ron Hale, PhD, CISM, ISACA, USA

The Evolving Information Security Professional 359

The Duality of the CISO 360

Job Responsibilities and Tasks 363

Conclusion 366

About ISACA 368

About Ron Hale 368

CHAPTER 26 Human Resources Security 369
Domenic Antonucci, Editor and Chief Risk Offi cer, Australia

Needs of Lower-Maturity HR Functions 369

Needs of Mid-Maturity HR Functions 370

Needs of Higher-Maturity HR Functions 372

Conclusion 373

About Domenic Antonucci 374

Epilogue 375
Becoming CyberSmart TM: a Risk Maturity Road Map for Measuring Capability Gap-Improvement
Domenic Antonucci, Editor and Chief Risk Offi cer (CRO), Australia
Didier Verstichel, Chief Information Security Offi cer (CISO) and Chief Risk Offi cer (CRO), Belgium

Background 375

Becoming CyberSmartTM 376

About Domenic Antonucci 392

About Didier Verstichel 392

Glossary 393

Index 399

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program