Votre titre Audible gratuit

9,95 € / mois après 30 jours. Résiliable à tout moment.

ou
Dans le panier

Vous êtes membre Amazon Prime ?

Bénéficiez automatiquement de 2 livres audio offerts.
Bonne écoute !

    Description

    A ground shaking exposé on the failure of popular cyber risk management methods.

    How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current "risk management" practices, and offers a series of improvement techniques that help you fill the holes and ramp up security. In his best-selling book How to Measure Anything, author Douglas W. Hubbard opened the business world's eyes to the critical need for better measurement. This book expands upon that premise and draws from The Failure of Risk Management to sound the alarm in the cybersecurity realm. Some of the field's premier risk management approaches actually create more risk than they mitigate, and questionable methods have been duplicated across industries and embedded in the products accepted as gospel. This book sheds light on these blatant risks and provides alternate techniques that can help improve your current situation. You'll also learn which approaches are too risky to save and are actually more damaging than a total lack of any security. Dangerous risk management methods abound; there is no industry more critically in need of solutions than cybersecurity. This book provides solutions where they exist, and advises when to change tracks entirely.

    • Discover the shortcomings of cybersecurity's "best practices"
    • Learn which risk management approaches actually create risk
    • Improve your current practices with practical alterations
    • Learn which methods are beyond saving, and worse than doing nothing

    Insightful and enlightening, this book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection, so finding cracks in the vault is a positive thing - as long as you get there before the bad guys do. How to Measure Anything in Cybersecurity Risk is your guide to more robust protection through better quantitative processes, approaches, and techniques.

    PLEASE NOTE: When you purchase this title, the accompanying reference material will be available in your Library section along with the audio.

    ©2016 John Wiley & Sons, Inc. (P)2016 Audible, Inc.

    Autres livres audio du même :

    Ce que les auditeurs disent de How to Measure Anything in Cybersecurity Risk

    Notations

    Commentaires - Veuillez sélectionner les onglets ci-dessous pour changer la provenance des commentaires.

    Il n'y a pas encore de critique disponible pour ce titre.
    Trier par :
    Trier par:
    • Global
      3 out of 5 stars
    • Interprétation
      3 out of 5 stars
    • Histoire
      3 out of 5 stars
    Image de profile pour Andy
    • Andy
    • 28/03/2017

    better know math and statistics before diving in

    I found this book enjoyable, but most of the math and statistics were way over my head.
    Fortunately, I'm a general manager and I can hire folks to do the good things that this book lays out. Before listening to this book, our cybersecurity matrix was green, yellow, red. Now we can move toward continuous measurement, which makes more sense.

    5 personnes ont trouvé cela utile

    • Global
      4 out of 5 stars
    • Interprétation
      3 out of 5 stars
    • Histoire
      3 out of 5 stars
    Image de profile pour Wanderer
    • Wanderer
    • 20/01/2017

    Not appropriate for audio, buy a hard copy instead

    Would you try another book from Douglas W. Hubbard and Richard Seiersen and/or Patrick Cronin?

    Yes, it was obvious that they knew their stuff

    Any additional comments?

    I liked this book, I wish I could return it for a hard copy. This book is well done but really hard to follow as an audio book, which is how I bought it. Audible says I can't return it.

    9 personnes ont trouvé cela utile

    • Global
      2 out of 5 stars
    • Interprétation
      3 out of 5 stars
    • Histoire
      2 out of 5 stars
    Image de profile pour Levi J. Hagemann
    • Levi J. Hagemann
    • 01/03/2018

    Umm...not for audio

    Great subject matter. Good read. Terrible book for audio. Need the hardcopy, otherwise just useless.

    2 personnes ont trouvé cela utile

    • Global
      5 out of 5 stars
    • Interprétation
      5 out of 5 stars
    • Histoire
      5 out of 5 stars
    Image de profile pour T. Leach
    • T. Leach
    • 04/01/2017

    Great book to understand Cybersecurity Risk

    Cybersecurity risk needs to adopt a quantitative risk metric driven approach. This book will help you understand why and walk you through some of the methods. It has a very applied hands on approach with links to downloadable spreadsheets.

    2 personnes ont trouvé cela utile

    • Global
      4 out of 5 stars
    • Interprétation
      5 out of 5 stars
    • Histoire
      5 out of 5 stars
    Image de profile pour JnettMcB
    • JnettMcB
    • 18/08/2020

    Great book, horrible audio book

    This book is packed full of graphs, images etc. it also has ALOT of equations. You need to see this to use this well. The audio book is painful . The real book is a great reference book to keep around.

    • Global
      4 out of 5 stars
    • Interprétation
      4 out of 5 stars
    • Histoire
      5 out of 5 stars
    Image de profile pour Technophobe01
    • Technophobe01
    • 17/07/2020

    Worth listening too

    Why? Developing an IT Security budget is really hard, this is one of the few books I feel is worth reading in order to get a predictive sense of risk of occurrence against impact.

    By estimating the potential occurrence of an event against the events business impact you can allocate funds against your estimates using a Bayesian statistical model.

    The audible book is a fine listen, though the description of excel formulas feels odd (chuckle), that said the actual book does a great job of demonstrating both the "how" and "why" of the approach using clear practical examples with a great accompanying web-site.



    • Global
      5 out of 5 stars
    • Interprétation
      5 out of 5 stars
    • Histoire
      5 out of 5 stars
    Image de profile pour Kurt
    • Kurt
    • 01/07/2020

    Awesome Risk Analysis Methods

    the hard part wad listening to math formulas being read. other than that, great! information.

    • Global
      1 out of 5 stars
    Image de profile pour LG
    • LG
    • 04/12/2019

    Mixed feelings on this

    Useless an audio book. Possibly better on paper.
    I'm still curious, however listening to Excel formulas is unbearable and very much yesterday.

    • Global
      5 out of 5 stars
    • Interprétation
      5 out of 5 stars
    • Histoire
      4 out of 5 stars
    Image de profile pour C.T.
    • C.T.
    • 24/08/2019

    Cybersecurity risk measurement reimagined

    Excellent rethinking of how to quantify and calculate real risks in Cybersecurity. This fresh, scientific, math-based approach to measuring and then calculating probabilities will allow realistic risk management of cybersecurity in corporations across all industries.

    This is a substantial tome requiring a paper or text-based, electronic version to leverage all its usefulness. The book is split in three sections. First, a high-level explanation of the concepts and a vigorous rallying cry to abandon the ineffective, and often misleading, status quo of cybersecurity risk measurement. Second, a detailed explanation of the theories with many real world research examples to back them up. And, lastly, a deep dive into how to use the provided Microsoft Excel spreadsheet formulae to begin implementing the theory in a actual cybersecurity program.

    The Audible version is well done, with the first two sections easy to follow and comprehend with only a few rewinds for grasping the intricacies of the theory. However, the third section is nearly impossible to follow audibly as the reader is required to voice long and complex Excel mathematical formulas. Of course, this is not a fault of the authors or the performance, just a result of the deep subject matter and detailed examples.

    • Global
      3 out of 5 stars
    Image de profile pour Cpt. Pat
    • Cpt. Pat
    • 12/07/2019

    Yes, that's the problem. But what's the solution?

    The author describes the problem well. But not the solution. Human threats defy measurement. To accomplish any kind of estimate, one needs to know the motives and methods of one's adversary. Without mindreading, one can only estimate - but never measure - risk. Patrick Bryant, CISSP, NASA infosec, retired

    Trier par :
    Trier par:
    • Global
      5 out of 5 stars
    • Interprétation
      5 out of 5 stars
    • Histoire
      5 out of 5 stars
    Image de profile pour momo48
    • momo48
    • 24/08/2020

    Insightful, scientific, convincing, and practicle

    A fantastic must-have book on cyber security and risk analysis! I liked it very much and will hear it soon again!