skip to content
How to measure anything in cybersecurity risk Preview this item
ClosePreview this item
Checking...

How to measure anything in cybersecurity risk

Author: Douglas W Hubbard; Richard Seiersen
Publisher: Hoboken : Wiley, [2016]
Edition/Format:   Print book : EnglishView all editions and formats
Summary:
"A ground shaking exposé on the failure of popular cyber risk management methods How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current "risk management" practices, and offers a series of improvement techniques that help you fill the holes and ramp up security. In his bestselling book How to Measure Anything, author Douglas W. Hubbard opened the business world's eyes to the critical need
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Material Type: Internet resource
Document Type: Book, Internet Resource
All Authors / Contributors: Douglas W Hubbard; Richard Seiersen
ISBN: 9781119085294 1119085292
OCLC Number: 920454627
Notes: Includes index.
Machine generated contents note: Foreword Daniel E. Geer, Jr. ix Foreword Stuart McClure xi Acknowledgments xiii About the Authors xv Introduction 1 PART I WHY CYBERSECURITY NEEDS BETTER MEASUREMENTS FOR RISK 5 CHAPTER 1 The One Patch Most Needed in Cybersecurity 7 CHAPTER 2 A Measurement Primer for Cybersecurity 19 CHAPTER 3 Model Now!: An Introduction to Practical Quantitative Methods for Cybersecurity 35 CHAPTER 4 The Single Most Important Measurement in Cybersecurity 55 CHAPTER 5 Risk Matrices, Lie Factors, Misconceptions, and Other Obstacles to Measuring Risk 81 PART II EVOLVING THE MODEL OF CYBERSECURITY RISK 111 CHAPTER 6 Decompose It: Unpacking the Details 113 CHAPTER 7 Calibrated Estimates: How Much Do You Know Now? 133 CHAPTER 8 Reducing Uncertainty with Bayesian Methods 157 CHAPTER 9 Some Powerful Methods Based on Bayes 169 PART III CYBERSECURITY RISK MANAGEMENT FOR THE ENTERPRISE 197 CHAPTER 10 Toward Security Metrics Maturity 199 CHAPTER 11 How Well Are My Security Investments Working Together? 213 CHAPTER 12 A Call to Action: How to Roll Out Cybersecurity Risk Management 229 APPENDIX A Select Distributions 239 APPENDIX B Guest Contributors 247 Index 269.
Description: xv, 280 pages ; 24 cm
Contents: Foreword / Daniel E. Geer, Jr. --
Foreword / Stuart McClure --
pt. I. Why cybersecurity needs better measurements for risk. The one patch most needed in cybersecurity --
A measurement primer for cybersecurity --
Model now! : an introduction to practical quantitative methods for cybersecurity --
The single most important measurement in cybersecurity --
Risk matrices, lie factors, misconceptions, and other obstacles to measuring risk --
pt. II. Evolving the model of cybersecurity risk. Decompose it : unpacking the details --
Calibrated estimates : how much do you know now? --
Reducing uncertainty with Bayesian Methods --
Some powerful methods based on Bayes --
pt. III. Cybersecurity risk management for the enterprise. Toward security metrics maturity --
How well are my security investments working together? --
A call to action : how to roll out cybersecurity risk management.
Responsibility: Douglas W. Hubbard, Richard Seiersen.

Abstract:

A ground shaking expose on the failure of popular cyber risk management methods How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current "risk management" practices, and  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Related Subjects:(5)

User lists with this item (3)

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/920454627> # How to measure anything in cybersecurity risk
    a schema:Book, schema:CreativeWork ;
    library:oclcnum "920454627" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/nju> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/3464880850#Topic/cyberspace_security_measures> ; # Cyberspace--Security measures
    schema:about <http://experiment.worldcat.org/entity/work/data/3464880850#Topic/cyberterrorism> ; # Cyberterrorism
    schema:about <http://experiment.worldcat.org/entity/work/data/3464880850#Topic/business_&_economics_statistics> ; # BUSINESS & ECONOMICS--Statistics
    schema:about <http://experiment.worldcat.org/entity/work/data/3464880850#Topic/computers_security_general> ; # COMPUTERS--Security--General
    schema:about <http://experiment.worldcat.org/entity/work/data/3464880850#Topic/risk_management> ; # Risk management
    schema:about <http://dewey.info/class/658.478/e23/> ;
    schema:author <http://experiment.worldcat.org/entity/work/data/3464880850#Person/hubbard_douglas_w_1962> ; # Douglas W. Hubbard
    schema:author <http://experiment.worldcat.org/entity/work/data/3464880850#Person/seiersen_richard_1967> ; # Richard Seiersen
    schema:bookFormat bgn:PrintBook ;
    schema:datePublished "2016" ;
    schema:description ""This book will critique some of cybersecurity's premier, seemingly quantitative, risk management approaches"--"@en ;
    schema:description "Foreword / Daniel E. Geer, Jr. -- Foreword / Stuart McClure -- pt. I. Why cybersecurity needs better measurements for risk. The one patch most needed in cybersecurity -- A measurement primer for cybersecurity -- Model now! : an introduction to practical quantitative methods for cybersecurity -- The single most important measurement in cybersecurity -- Risk matrices, lie factors, misconceptions, and other obstacles to measuring risk -- pt. II. Evolving the model of cybersecurity risk. Decompose it : unpacking the details -- Calibrated estimates : how much do you know now? -- Reducing uncertainty with Bayesian Methods -- Some powerful methods based on Bayes -- pt. III. Cybersecurity risk management for the enterprise. Toward security metrics maturity -- How well are my security investments working together? -- A call to action : how to roll out cybersecurity risk management."@en ;
    schema:description ""A ground shaking exposé on the failure of popular cyber risk management methods How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current "risk management" practices, and offers a series of improvement techniques that help you fill the holes and ramp up security. In his bestselling book How to Measure Anything, author Douglas W. Hubbard opened the business world's eyes to the critical need for better measurement. This book expands upon that premise and draws from The Failure of Risk Management to sound the alarm in the cybersecurity realm. Some of the field's premier risk management approaches actually create more risk than they mitigate, and questionable methods have been duplicated across industries and embedded in the products accepted as gospel. This book sheds light on these blatant risks, and provides alternate techniques that can help improve your current situation. You'll also learn which approaches are too risky to save, and are actually more damaging than a total lack of any security. Dangerous risk management methods abound; there is no industry more critically in need of solutions than cybersecurity. This book provides solutions where they exist, and advises when to change tracks entirely. Discover the shortcomings of cybersecurity's "best practices" Learn which risk management approaches actually create risk Improve your current practices with practical alterations Learn which methods are beyond saving, and worse than doing nothing Insightful and enlightening, this book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection, so finding cracks in the vault is a positive thing & mdash;as long as you get there before the bad guys do. How to Measure Anything in Cybersecurity Risk is your guide to more robust protection through better quantitative processes, approaches, and techniques"--"@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/3464880850> ;
    schema:inLanguage "en" ;
    schema:name "How to measure anything in cybersecurity risk"@en ;
    schema:productID "920454627" ;
    schema:url <https://shibboleth2sp.gar.semcs.net/Shibboleth.sso/Login?entityID=https://passport01.leeds.ac.uk/idp/shibboleth&target=https://shibboleth2sp.gar.semcs.net/shib?dest=http%253A%252F%252Fwww.vlebooks.com%252FSHIBBOLETH%253Fdest%253Dhttp%25253A%25252F%25252Fwww.vlebooks.com%25252Fvleweb%25252Fproduct%25252Fopenreader%25253Fid%25253DLeedsUni%252526isbn%25253D9781119224600> ;
    schema:workExample <http://worldcat.org/isbn/9781119085294> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/920454627> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/3464880850#Person/hubbard_douglas_w_1962> # Douglas W. Hubbard
    a schema:Person ;
    schema:birthDate "1962" ;
    schema:familyName "Hubbard" ;
    schema:givenName "Douglas W." ;
    schema:name "Douglas W. Hubbard" ;
    .

<http://experiment.worldcat.org/entity/work/data/3464880850#Person/seiersen_richard_1967> # Richard Seiersen
    a schema:Person ;
    schema:birthDate "1967" ;
    schema:familyName "Seiersen" ;
    schema:givenName "Richard" ;
    schema:name "Richard Seiersen" ;
    .

<http://experiment.worldcat.org/entity/work/data/3464880850#Topic/business_&_economics_statistics> # BUSINESS & ECONOMICS--Statistics
    a schema:Intangible ;
    schema:name "BUSINESS & ECONOMICS--Statistics"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/3464880850#Topic/computers_security_general> # COMPUTERS--Security--General
    a schema:Intangible ;
    schema:name "COMPUTERS--Security--General"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/3464880850#Topic/cyberspace_security_measures> # Cyberspace--Security measures
    a schema:Intangible ;
    schema:name "Cyberspace--Security measures"@en ;
    .

<http://worldcat.org/isbn/9781119085294>
    a schema:ProductModel ;
    schema:isbn "1119085292" ;
    schema:isbn "9781119085294" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.