机读格式显示(MARC)
- 000 03139cam a2200373 i 4500
- 008 241022t20252025enka b 001 0 eng d
- 020 __ |a 9781032947624 |q hardcover
- 020 __ |a 1032947624 |q hardcover
- 020 __ |a 9781032947617 |q paperback
- 020 __ |a 1032947616 |q paperback
- 020 __ |z 9781003581321 |q electronic book
- 020 __ |z 9781040325100 |q electronic publication
- 020 __ |z 9781040325087 |q electronic book
- 040 __ |a DLC |b eng |e rda |c DLC |d IG# |d OCLCO |d UKMGB |d YDX |d DLC
- 050 00 |a HV6773 |b .E935 2025
- 082 00 |a 364.16/8 |2 23/eng/20250318
- 100 1_ |a Evans, Ariel, |e author.
- 245 10 |a Navigating supply chain cyber risk : |b a comprehensive guide to managing third party cyber risk / |c Ariel Evans, Ajay Singh and Alex Golbin.
- 260 __ |a Abingdon, Oxon ; |a New York, NY : |b Routledge, Taylor & Francis Group, |c 2025.
- 300 __ |a xvi, 216 pages : |b illustrations (black and white) ; |c 25 cm
- 336 __ |a text |b txt |2 rdacontent
- 337 __ |a unmediated |b n |2 rdamedia
- 338 __ |a volume |b nc |2 rdacarrier
- 504 __ |a Includes bibliographical references and index.
- 520 __ |a "Cybersecurity is typically viewed as the boogeyman, and vendors are responsible for 63% of reported data breaches in organisations. And as businesses grow, they will use more and more third parties to provide specialty services. Typical cybersecurity training programs focus on phishing awareness and email hygiene. This is not enough. Navigating Supply Chain Cyber Risk: A Comprehensive Guide to Managing Third Party Cyber Risk helps companies establish cyber vendor risk management programs and understand cybersecurity in its true context from a business perspective. The concept of cybersecurity until recently has revolved around protecting the perimeter. Today we know that the concept of the perimeter is dead. The corporate perimeter in cyber terms is no longer limited to the enterprise alone, but extends to its business partners, associates and third parties that connect to its IT systems. This book, written by leaders and cyber risk experts in business, is based on three years of research with the Fortune 1000 and cyber insurance industry carriers, reinsurers, and brokers and the collective wisdom and experience of the authors in Third Party Risk Management, and serves as a ready reference for developing policies, procedures, guidelines, and addressing evolving compliance requirements related to vendor cyber risk management. It is unique since it provides strategies and learnings that have shown to lower risk and demystify cyber risk when dealing with third and fourth parties. The book is essential reading for CISOs, DPOs, CPOs, Sourcing Managers, Vendor Risk Managers, Chief Procurement Officers, Cyber Risk Managers, Compliance Managers, and other cyber stakeholders, as well as students in cyber security"-- Provided by publisher.
- 650 _0 |a Computer crimes |x Prevention.
- 650 _0 |a Computer security.
- 650 _6 |a Se?curite? informatique.
- 700 1_ |a Singh, Ajay, |e author.
- 700 1_ |a Golbin, Alex, |e author.