Skip to Content
How Cyber Security Can Protect Your Business - A guide for all stakeholders
book

How Cyber Security Can Protect Your Business - A guide for all stakeholders

by Christopher Wright
November 2019
Beginner to intermediate content levelBeginner to intermediate
68 pages
1h 12m
English
IT Governance Publishing
Content preview from How Cyber Security Can Protect Your Business - A guide for all stakeholders

CHAPTER 4: CYBER RISKS AND CONTROLS

Introduction and overview

The process described in the previous chapter can be used to manage any risk management process, including cyber. Where cyber differs is in the specific nature of the risks faced by organisations and the controls used to mitigate them. Cyber risks can be categorised, like other IT security risks, using CIA.

Confidentiality – relates to organisations’ duty of care, and legal responsibility (under the GDPR or other relevant data privacy legislation): they must act as the guardian of the personal and sensitive data they hold on behalf of customers, employees, suppliers, etc. Organisations should also have a means to classify data based on its importance to the business, e.g. information ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Managing Fraud Risk: A Practical Guide for Directors and Managers

Managing Fraud Risk: A Practical Guide for Directors and Managers

Steve Giles
Privileged Access Management for Secure Storage Administration: IBM Spectrum Scale with IBM Security Verify Privilege Vault

Privileged Access Management for Secure Storage Administration: IBM Spectrum Scale with IBM Security Verify Privilege Vault

Vincent Hsu, Sridhar Muppidi, Sandeep R. Patil, Kanad Jadhav, Sumit Kumar, Nishant Singhai

Publisher Resources

ISBN: 9781787781979