Hardcover: 304 pages
Publisher: Wiley; 1 edition (July 25, 2016)
Language: English
ISBN-10: 1119085292
ISBN-13: 978-1119085294
Product Dimensions: 6.3 x 1 x 9.3 inches
Shipping Weight: 1.1 pounds (View shipping rates and policies)
Average Customer Review: 4.8 out of 5 stars See all reviews (9 customer reviews)
Best Sellers Rank: #79,467 in Books (See Top 100 in Books) #94 in Books > Business & Money > Education & Reference > Statistics #176 in Books > Science & Math > Mathematics > Applied > Statistics #230 in Books > Computers & Technology > Security & Encryption
This book is a major contribution to our understanding of this critical subject. The main idea is that the biggest risk in cybersecurity risk assessment is reliance on ineffective methods, often because people don't believe quantitative forecasts will work and then, when they do use quantitative estimates, don't track them to see how well they do.. This echoes Hubbard's reasoning about financial forecasts in The Failure of Risk Management; he has more data to back him up now.While readers familiar with Hubbard's earlier work will find some repetition of what they know in the first half of the book, it is still worthwhile even for them. Hubbard has expanded and refined his treatment of his inventions, calibration and Applied Information Economics, and added examples. There is also a new presentation, in Chapters 8 and 9, of Bayesian inference, with a number of references to real-life applications. Chapters 10 through 12, which I surmise were largely written by cybersecurity expert Richard Seiersen, are excellent.The authors' outline of how to establish and manage a Cybersecurity Risk Management function in an organization, and what that functional unit should do, are well written, well reasoned, and cogent. He lays out the key areas of responsibility this function should include: review all major initiatives for technology risk; monitor and analyze existing controls investments; use proven quantitative methods to understand and communicate risk; maintain organizational risk tolerances in coordination with the chief financial officer, general counsel, and the board; manage and monitor exception-management programs that violate established risk tolerances; and maintain cyberinsurance policies, in conjunction with legal and finance.
How to Measure Anything in Cybersecurity Risk Measure Twice, Cut Once: Simple Steps to Measure, Scale, Draw and Make the Perfect Cut-Every Time. (Popular Woodworking) Measure for Measure (Arden Shakespeare: Second Series) Measure for Measure (Arkangel Shakespeare) How to Measure Anything: Finding the Value of 'Intangibles' in Business The Feeling of Risk: New Perspectives on Risk Perception (Earthscan Risk in Society) Cybersecurity for Everyone: Securing your home or small business network Cybersecurity: Home and Small Business Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems Cybersecurity (Special Reports) Cybersecurity Leadership: Powering the Modern Organization Cybersecurity and Cyberwar: What Everyone Needs to Know ISO/IEC 31010:2009, Risk management - Risk assessment techniques Security Risk Management: Building an Information Security Risk Management Program from the Ground Up COSO Enterprise Risk Management: Establishing Effective Governance, Risk, and Compliance (GRC) Processes Global Risk Agility and Decision Making: Organizational Resilience in the Era of Man-Made Risk Advances in Heavy Tailed Risk Modeling: A Handbook of Operational Risk (Wiley Handbooks in Financial Engineering and Econometrics) Quantitative Risk Management, + Website: A Practical Guide to Financial Risk Operational Risk Management: A Complete Guide to a Successful Operational Risk Framework Project Risk Management Guidelines: Managing Risk in Large Projects and Complex Procurements