|
Showing 1 - 8 of
8 matches in All Departments
|
Cognitive Risk (Paperback)
James Bone, Jessie H Lee
|
R1,076
R1,020
Discovery Miles 10 200
Save R56 (5%)
|
Ships in 12 - 17 working days
|
Unique selling point: • This book combines risk management,
cybersecurity and behavioral and decision science in one book with
case studies, mitigation plans, and a new risk framework to address
cognitive risks. Core audience: • Corporate and government risk,
audit, IT security and compliance organisations Place in the
market: • Cognitive Risks differs from competitive books by
reframing the role of human behavior in risk.
Unique selling point: • This book combines risk management,
cybersecurity and behavioral and decision science in one book with
case studies, mitigation plans, and a new risk framework to address
cognitive risks. Core audience: • Corporate and government risk,
audit, IT security and compliance organisations Place in the
market: • Cognitive Risks differs from competitive books by
reframing the role of human behavior in risk.
This book explores a broad cross section of research and actual
case studies to draw out new insights that may be used to build a
benchmark for IT security professionals. This research takes a
deeper dive beneath the surface of the analysis to uncover novel
ways to mitigate data security vulnerabilities, connect the dots
and identify patterns in the data on breaches. This analysis will
assist security professionals not only in benchmarking their risk
management programs but also in identifying forward looking
security measures to narrow the path of future vulnerabilities.
This book explores a broad cross section of research and actual
case studies to draw out new insights that may be used to build a
benchmark for IT security professionals. This research takes a
deeper dive beneath the surface of the analysis to uncover novel
ways to mitigate data security vulnerabilities, connect the dots
and identify patterns in the data on breaches. This analysis will
assist security professionals not only in benchmarking their risk
management programs but also in identifying forward looking
security measures to narrow the path of future vulnerabilities.
|
You may like...
Higher
Michael Buble
CD
(1)
R459
Discovery Miles 4 590
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.