TY - BOOK AU - Bernik,Jose M. AU - Engemann,Krista N. AU - Engemann,Kurt J. AU - Fitzgerald,Todd AU - Hetner,Chris AU - Hyat-Khan,Saquib AU - King-Wilson,Phillip AU - McKinney,Robert AU - Miller,Holmes E. AU - Nobles,Calvin AU - Ogu,Emmanuel C. AU - Richardson,Robert AU - Robinson,Nikki AU - Shin,Heechang AU - Soluade,Oredola AU - Witty,Jason A. TI - Developments in Managing and Exploiting Risk T2 - Developments in Managing and Exploiting Risk SN - 9783111286013 U1 - 005.8 PY - 2024///] CY - Berlin, Boston PB - De Gruyter KW - COMPUTERS / Security / General KW - bisacsh KW - Cyberattack KW - Cybercriminals KW - Cybersecurity KW - Cyberthreats KW - Infrastructure Ransomware Attacks KW - Risk Management KW - Threat Actors N1 - Frontmatter --; Advances in cybersecurity risk management --; Contents --; Part I: Fundamentals --; 1 Introduction to and brief history of cybersecurity risk management --; 2 Hierarchical considerations in cyber risk assessments: Strategic versus operational prioritization in managing current and emergent threats --; 3 The benefits of human factors engineering in cybersecurity --; 4 An organizational climate primer for the development of cybersecurity socio-organizational frameworks --; 5 Transparent and inclusive cybersecurity risk management and governance --; 6 Securing artificial intelligence in the real world --; Part II: Applications --; 7 The CISO evolution and impact on goals, processes, and priorities --; 8 Towards a more secure IT driven future: The necessity and promise of IT operations management governance --; 9 Practical cyber risk management – preventing the predictable: Drivers of decision making under risk --; 10 Implications of artificial intelligence in cybersecurity for individuals --; 11 Ensuring transportation cybersecurity: Air, auto, and rail --; 12 Towards robust policy frameworks for securing cyber-physical systems in healthcare --; Contributors --; Index --; Developments in managing and exploiting risk; restricted access; Issued also in print N2 - Cybersecurity refers to the set of technologies, practices, and strategies designed to protect computer systems, networks, devices, and data from unauthorized access, theft, damage, disruption, or misuse. It involves identifying and assessing potential threats and vulnerabilities, and implementing controls and countermeasures to prevent or mitigate them. Some major risks of a successful cyberattack include: data breaches, ransomware attacks, disruption of services, damage to infrastructure, espionage and sabotage. Cybersecurity Risk Management: Enhancing Leadership and Expertise explores this highly dynamic field that is situated in a fascinating juxtaposition with an extremely advanced and capable set of cyber threat adversaries, rapidly evolving technologies, global digitalization, complex international rules and regulations, geo-politics, and even warfare. A successful cyber-attack can have significant consequences for individuals, organizations, and society as a whole. With comprehensive chapters in the first part of the book covering fundamental concepts and approaches, and those in the second illustrating applications of these fundamental principles, Cybersecurity Risk Management: Enhancing Leadership and Expertise makes an important contribution to the literature in the field by proposing an appropriate basis for managing cybersecurity risk to overcome practical challenges UR - https://doi.org/10.1515/9783111289069 UR - https://www.degruyter.com/isbn/9783111289069 UR - https://www.degruyter.com/document/cover/isbn/9783111289069/original ER -