- Academic institutions
- Active defense
- Advocacy groups
- Air gap
- Annual Meeting of New Champions xx
- Anti-virus tools
- Application development
- Atlantic Council
- Behavioral change
- Biddle, Stephen
- Business case
- Business disruption
- Business information, loss of
- Business process controls
- Business risks
- to determine plan sequence
- Center for a New American Security
- CEO involvement
- CISO
- Civil society
- Cloud computing
- Collaboration within industries
- Competitive disadvantage
- Corporate culture
- Cost of breach
- Coviello, Art
- CSO magazine xx
- Customer data, loss of
- Customer experience
- Cyber criminals
- attackers’ advantage
- marketplace
- on your system
- prosecution
- tactics, techniques, and procedures
- types of attacker
- Cyber Risk Maturity Survey
- “Cybergeddon”
- Cybersecurity
- analytics
- awareness
- budget
- change management program
- controls
- education
- government
- impact on business
- in business processes
- in IT
- insurance
- intelligence
- national strategy
- operating models
- organizational structure
- practices
- program oversight
- quantifying risk
- relationship with IT
- role of international bodies
- scenarios
- skills and capabilities
- standards and frameworks
- talent
- types of attacker
- types of incident
- types of risk
- Dark net
- Data centers
- Data loss protection
- Davos, World Economic Forum meeting
- Deceptive sandbox
- Design thinking
- Digital ecosystem
- Digital resilience
- Digital rights management
- Digitization
- Distributed denial of service
- Document management tools
- Firewalls
- Fraud
- Frontline employees
- Hacktivists
- Healey, Jason
- Heartbleed
- Honeypots
- Human Resources
- Identity & Access Management
- Incident response
- coordination
- decision making
- plan
- post mortem
- shortcomings
- see War gaming
- Information assets
- Innovation, delays in
- Insider attacks
- Insurance
- Intellectual property, loss of
- International Organization for Standardization
- Internet of Things
- Intrusion detection systems
- ISACs
- IT
- budgets
- controls
- leadership
- lean IT
- vulnerabilities
- Law enforcement
- Legal and regulatory exposure
- Lord, Kristin
- McKinsey & Company
- McKinsey Global Institute
- Mobile technology
- Multifactor authentication
- Multinational organizations
- National Institute of Science and Technology
- National security
- Network segmentation
- Operations
- Organization of American States
- Organized crime
- Patching
- Penetration testing
- Perimeter
- Phishing
- Phoenix Project, The
- Private cloud
- Procurement
- Product development
- Productivity
- Public cloud
- Public policy
- RAND Institute
- Regulation
- Reputational damage
- Risk
- appetite
- management
- prioritization
- quantifying
- Safety programs
- Sales & Marketing
- Scenario planning
- Schneier, Bruce
- Schwartz, Peter
- Scorecard
- Secunia
- Security incident and event management
- Security Operations Center (SOC)
- Senior management
- Shellshock Bash
- Software-defined networking
- State-sponsored attackers
- Supply chain
- Tar pit
- Technology suppliers
- Value chain
- Vendor management
- Virtual desktop infrastructure
- Virtualization
- Wack, Pierre
- War gaming
- War room
- Workloads
- World Economic Forum
..................Content has been hidden....................
You can't read the all page of ebook, please click
here login for view all page.