Academic literature on the topic 'Cybersecurity risk management'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cybersecurity risk management.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cybersecurity risk management"

1

Eaton, Tim V., Jonathan H. Grenier, and David Layman. "Accounting and Cybersecurity Risk Management." Current Issues in Auditing 13, no. 2 (2019): C1—C9. http://dx.doi.org/10.2308/ciia-52419.

Full text
Abstract:
SUMMARY As the number of cybersecurity incidents continue to rise and stakeholders are becoming increasingly concerned, companies are devoting considerable resources to their cybersecurity risk management efforts and related cybersecurity disclosures. This paper describes how accountants are uniquely positioned to assist companies with these efforts in advisory and assurance capacities. We present a model of effective cybersecurity risk management and discuss how accountants' core competencies can add significant value in each of the model's five stages. In addition, we use several recent high
APA, Harvard, Vancouver, ISO, and other styles
2

Jafarov, N. "REDUCING CYBERSECURITY RISKS BY AUTOMATIZING RISK MANAGEMENT." Znanstvena misel journal, no. 97 (December 30, 2024): 52–55. https://doi.org/10.5281/zenodo.14575450.

Full text
Abstract:
The article explains how to reduce cybersecurity risks by automating risk management. The capabilities of the Security Vision Cyber Risk System, which creates the basis for automating the full cycle of cyber risk management, are explained. The essence of risk management automation and what it is needed for are given, as well as the main advantages of risk management automation.
APA, Harvard, Vancouver, ISO, and other styles
3

Briscoe, Christopher, and Carl Young. "Scale, Complexity, and Cybersecurity Risk Management." Journal of Information Security 15, no. 04 (2024): 524–44. http://dx.doi.org/10.4236/jis.2024.154029.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Burrell, Darrell Norman. "Understanding Healthcare Cybersecurity Risk Management Complexity." Land Forces Academy Review 29, no. 1 (2024): 38–49. http://dx.doi.org/10.2478/raft-2024-0004.

Full text
Abstract:
Abstract It is important to fully comprehend the critical role of the healthcare and public health sector in safeguarding the economy from various threats, including terrorism, infectious diseases, and natural disasters. The private ownership of many healthcare assets underscores the need for enhanced collaboration and information sharing between the public and private sectors. The COVID-19 pandemic has accelerated the digitalization of this sector, leading to a heightened risk of cyber threats. The increasing reliance on emerging technologies such as blockchain, the metaverse, and virtual rea
APA, Harvard, Vancouver, ISO, and other styles
5

Almaiah, Mohammed Amin. "Editorial: STAP Journal of Security Risk Management." STAP Journal of Security Risk Management 2023, no. 1 (2023): 1–2. https://doi.org/10.63180/jsrm.thestap.2023.1.1.

Full text
Abstract:
Dear Readers, It is with great pleasure that we introduce to you our upcoming journal, " STAP Journal of Security Risk Management." This journal is dedicated to exploring the advancements in the field of cybersecurity and providing a platform for researchers and scholars to exchange ideas, fostering progress in the area of security and risk management. On behalf of the editorial team, I extend our heartfelt gratitude and a warm welcome to the scholars, experts, researchers, and readers who support and follow our journal. Purpose of the Journal The STAP Journal of Security Risk Management aims
APA, Harvard, Vancouver, ISO, and other styles
6

Olawoyin, Olayinka Michael. "Blockchain Technology in Risk Management: Strengthening Cybersecurity and Financial Integrity." International Journal of Research Publication and Reviews 5, no. 10 (2024): 2336–48. http://dx.doi.org/10.55248/gengpi.5.1024.2829.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gruba, Łukasz. "Cybersecurity risk assessment in railway applications." WUT Journal of Transportation Engineering 137 (December 1, 2023): 153–65. https://doi.org/10.5604/01.3001.0054.9040.

Full text
Abstract:
Abstract: Cybersecurity has become an extremely important aspect in the modern world, and its importance extends to various sectors, including railway transport. Particularly noteworthy is cybersecurity in the field of systems and products that have a direct impact on the safety of rail traffic. For such solutions, it is necessary to develop a common approach to cybersecurity management that will ensure adequate resistance of the product to intentional or unintentional attacks from the outside, covering all stages of the product's life. The article focuses on presenting the issue of cybersecur
APA, Harvard, Vancouver, ISO, and other styles
8

Kure, Halima Ibrahim, and Shareeful Islam. "Assets focus risk management framework for critical infrastructure cybersecurity risk management." IET Cyber-Physical Systems: Theory & Applications 4, no. 4 (2019): 332–40. http://dx.doi.org/10.1049/iet-cps.2018.5079.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Li, He, Won Gyun No, and Tawei Wang. "SEC's cybersecurity disclosure guidance and disclosed cybersecurity risk factors." International Journal of Accounting Information Systems 30 (September 2018): 40–55. http://dx.doi.org/10.1016/j.accinf.2018.06.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Keskin, Omer F., Kevin Matthe Caramancion, Irem Tatar, Owais Raza, and Unal Tatar. "Cyber Third-Party Risk Management: A Comparison of Non-Intrusive Risk Scoring Reports." Electronics 10, no. 10 (2021): 1168. http://dx.doi.org/10.3390/electronics10101168.

Full text
Abstract:
Cybersecurity is a concern for organizations in this era. However, strengthening the security of an organization’s internal network may not be sufficient since modern organizations depend on third parties, and these dependencies may open new attack paths to cybercriminals. Cyber Third-Party Risk Management (C-TPRM) is a relatively new concept in the business world. All vendors or partners possess a potential security vulnerability and threat. Even if an organization has the best cybersecurity practice, its data, customers, and reputation may be at risk because of a third party. Organizations s
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Cybersecurity risk management"

1

Murray, Glenn Kristian. "Managing cybersecurity risk for critical infrastructure: A framework to secure critical infrastructure." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2024. https://ro.ecu.edu.au/theses/2864.

Full text
Abstract:
As cyber threats continue to evolve, the protection of critical infrastructure has become a paramount concern, particularly considering the devastating potential these threats hold. The 2024 cyberattack on Change Healthcare, which resulted in significant financial losses for UnitedHealth, $870 million in the first quarter alone and up to $1.6 billion for the year, highlights the urgent need for effective cybersecurity measures to safeguard essential services. This thesis investigates the cybersecurity maturity of Australian critical infrastructure healthcare and, food and grocery sectors., foc
APA, Harvard, Vancouver, ISO, and other styles
2

Rassega, Valter. "Cyber security risk management nei servizi pubblici strategici." Doctoral thesis, Universita degli studi di Salerno, 2017. http://hdl.handle.net/10556/2571.

Full text
Abstract:
2015 - 2016<br>The global digital network, with its ability to communicate directly and in real time between people in every part of the planet, is a formidable tool to develop relationships and realize exchange of information and knowledge. In cyberspace they coexist people of all kinds, characterized by different interests, different cultures and different ways of relating to others. From an economic point of view, the global network has become a formidable transactional tool for the exchange of goods and services and there is the commercial and industrial sector that has not arrived in som
APA, Harvard, Vancouver, ISO, and other styles
3

Steinbernreiter, Kajsa. ""The cyber war" : A qualitative study investigating the management of cybersecurity in Swedish online fashion companies." Thesis, Högskolan i Borås, Akademin för textil, teknik och ekonomi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-22101.

Full text
Abstract:
Due to a world-wide digitalisation, the fashion segment has experienced a shift from offline to online shopping. Consequently, more companies choose to interconnect digitally with consumers and suppliers. This highlights cyber risks and cybersecurity issues more than ever, which becomes specifically apparent amongst online companies. Through qualitative semi-structured interviews with three different Swedish online fashion companies, the purpose of investigating how cybersecurity currently is prioritised and managed was reached. In addition to this, two cybersecurity experts gave their view of
APA, Harvard, Vancouver, ISO, and other styles
4

Baker, Wade Henderson. "Toward a Decision Support System for Measuring and Managing Cybersecurity Risk in Supply Chains." Diss., Virginia Tech, 2017. http://hdl.handle.net/10919/85128.

Full text
Abstract:
Much of the confusion about the effectiveness of information security programs concerns not only how to measure, but also what to measure — an issue of equivocality. Thus, to lower uncertainty for improved decision-making, it is first essential to reduce equivocality by defining, expanding, and clarifying risk factors so that metrics, the "necessary measures," can be unambiguously applied. We formulate a system that (1) allows threats to be accurately measured and tracked, (2) enables the impacts and costs of successful threats to be determined, and (3) aids in evaluating the effectiveness and
APA, Harvard, Vancouver, ISO, and other styles
5

Gao, Olivia Qing. "Risk Assessment for IoT : a system evaluation of the smart home and its cybersecurity imperative." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/106247.

Full text
Abstract:
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, School of Engineering, System Design and Management Program, Engineering and Management Program, 2016.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (pages 92-107).<br>In the past two decades, the exponential growth of the modern Internet with the digitization of most human activities such as data gathering and storage have also fueled the growth of cybercrimes. In more recent years, the modern Internet is spreading into everyday life through the Internet of Things (IoT), which
APA, Harvard, Vancouver, ISO, and other styles
6

Stefanska, Beata, and Fatimah Laura Al-Dawod. "The importance of risk awareness in cybersecurity among companies : A perspective on the role of top management." Thesis, Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177218.

Full text
Abstract:
Background: Today´s world is characterized by a high level of digitalization that contributes to the development of new and effective technologies. However, this digital success requires knowledge and awareness about cybersecurity. Previous studies have shown that during 2020 the number of cyber-attacks among Swedish companies have increased. Due to digitalization, external parties find new methods to enter a company's systems and take advantage of its innovations and valuable information. That can affect the company's value negatively by ruining its reputation and making the stakeholders mist
APA, Harvard, Vancouver, ISO, and other styles
7

Arowolo, Olatunji Mujib. "Strategic Cyber-Risk Implications of Cloud Technology Adoption in the U.S. Financial Services Sector." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4347.

Full text
Abstract:
According to research, the risks of adopting new technology and the technological and organizational factors that influence adopting it are not clear. Thus, many financial institutions have hesitated to adopt cloud-computing. The purpose of this quantitative, cross-sectional study was to evaluate the cyber-risk implications of cloud-computing adoption in the U.S. financial services sector. The study examined 6 technological and organizational factors: organization size, relative advantage, compliance, security, compatibility, and complexity within the context of cyber-risk. Using a combination
APA, Harvard, Vancouver, ISO, and other styles
8

Abu-Shaqra, Baha. "Technoethics and Sensemaking: Risk Assessment and Knowledge Management of Ethical Hacking in a Sociotechnical Society." Thesis, Université d'Ottawa / University of Ottawa, 2020. http://hdl.handle.net/10393/40393.

Full text
Abstract:
Cyber attacks by domestic and foreign threat actors are increasing in frequency and sophistication. Cyber adversaries exploit a cybersecurity skill/knowledge gap and an open society, undermining the information security/privacy of citizens and businesses and eroding trust in governments, thus threatening social and political stability. The use of open digital hacking technologies in ethical hacking in higher education and within broader society raises ethical, technical, social, and political challenges for liberal democracies. Programs teaching ethical hacking in higher education are steadily
APA, Harvard, Vancouver, ISO, and other styles
9

Takacs, Gergely. "Integration of CTI into security management." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-74246.

Full text
Abstract:
Current thesis is a documentative approach to sum up experiences of a practical projectof implementing Cyber Threat Intelligence into an existing information securitymanagement system and delivering best practices using action design researchmethodology. The project itself was delivered to a multinational energy provider in 2017.The aim of the CTI-implementation was to improve the information security posture ofthe customer. The author, as participant of the delivery team presents an extensive reviewof the current literature on CTI and puts the need for threat intelligence into context. Theaut
APA, Harvard, Vancouver, ISO, and other styles
10

Curran, Theresa. "Standardizing Instructional Definition and Content Supporting Information Security Compliance Requirements." Diss., NSUWorks, 2018. https://nsuworks.nova.edu/gscis_etd/1038.

Full text
Abstract:
Information security (IS)-related risks affect global public and private organizations on a daily basis. These risks may be introduced through technical or human-based activities, and can include fraud, hacking, malware, insider abuse, physical loss, mobile device misconfiguration or unintended disclosure. Numerous and diverse regulatory and contractual compliance requirements have been mandated to assist organizations proactively prevent these types of risks. Two constants are noted in these requirements. The first constant is requiring organizations to disseminate security policies addressi
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Cybersecurity risk management"

1

Rohmeyer, Paul, and Jennifer L. Bayuk. Financial Cybersecurity Risk Management. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4194-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

United States. Congress. House. Committee on Homeland Security. Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies. Protecting the homeland from nuclear and radiological threats: Hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, second session, July 29, 2014. U.S. Government Publishing Office, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Stepping Through Cybersecurity Risk Management. Wiley & Sons, Limited, John, 2024.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Stepping Through Cybersecurity Risk Management. Wiley & Sons, Incorporated, John, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Stepping Through Cybersecurity Risk Management. Wiley & Sons, Incorporated, John, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Stepping Through Cybersecurity Risk Management. Wiley & Sons, Incorporated, John, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Oh, Kok-Boon. Cybersecurity Risk Management: An ERM Approach. Nova Science Publishers, Incorporated, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Oh, Kok-Boon. Cybersecurity Risk Management: An ERM Approach. Nova Science Publishers, Incorporated, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kissoon, Tara. Optimal Spending on Cybersecurity Measures: Risk Management. Taylor & Francis Group, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Blokdyk, Gerardus. Cybersecurity Risk Management Complete Self-Assessment Guide. Createspace Independent Publishing Platform, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Cybersecurity risk management"

1

Jøsang, Audun. "Cyber Risk Management." In Cybersecurity. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-68483-8_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Refsdal, Atle, Bjørnar Solhaug, and Ketil Stølen. "Cybersecurity." In Cyber-Risk Management. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23570-7_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Watters, Paul A. "Risk Management." In Cybercrime and Cybersecurity. CRC Press, 2023. http://dx.doi.org/10.1201/9781003406730-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kissoon, Tara. "Cybersecurity Risk Management Framework." In Optimal Spending on Cybersecurity Measures. CRC Press, 2024. http://dx.doi.org/10.1201/9781003497523-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kissoon, Tara. "Cybersecurity risk-management framework." In Optimal Spending on Cybersecurity Measures. Routledge, 2021. http://dx.doi.org/10.4324/9781003200895-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kissoon, Tara. "Cybersecurity Risk Management Framework." In Optimal Spending on Cybersecurity Measures. CRC Press, 2025. https://doi.org/10.1201/9781003587576-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kissoon, Tara. "Cybersecurity Risk Management Framework." In Optimal Spending on Cybersecurity Measures. CRC Press, 2025. https://doi.org/10.1201/9781003587569-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kissoon, Tara. "Cybersecurity Risk Management Framework." In Optimal Spending on Cybersecurity Measures. CRC Press, 2025. https://doi.org/10.1201/9781003527213-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kissoon, Tara. "AI Risk Management." In Optimal Spending on Cybersecurity Measures. CRC Press, 2025. https://doi.org/10.1201/9781003587569-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kissoon, Tara. "Risk-management practice – vulnerability management." In Optimal Spending on Cybersecurity Measures. Routledge, 2021. http://dx.doi.org/10.4324/9781003200895-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cybersecurity risk management"

1

Marek, James. "Cybersecurity and Risk Management Framework in Avionics." In Vertical Flight Society 74th Annual Forum & Technology Display. The Vertical Flight Society, 2018. http://dx.doi.org/10.4050/f-0074-2018-12893.

Full text
Abstract:
It is impossible to open a newspaper, turn on a television, or visit a news website these days without being barraged with cybersecurity related news. Every domain is being attacked, penetrated, and impacted by cyber-crime and the range, complexity, and frequency of attacks is expanding daily. Across the board we face a wide range of adversaries from disgruntled employees to nation states that are bent on taking our critical systems down temporarily or permanently. Avionics systems are not immune from this and over the past several years, cybersecurity policies and the Risk Management Framewor
APA, Harvard, Vancouver, ISO, and other styles
2

Jabbar, Haidar, Samir Al-Janabi, and Francis Syms. "AI-Integrated Cyber Security Risk Management Framework for IT Projects." In 2024 International Jordanian Cybersecurity Conference (IJCC). IEEE, 2024. https://doi.org/10.1109/ijcc64742.2024.10847294.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mann, Zoltán Ádám. "Urgency in Cybersecurity Risk Management: Toward a Solid Theory." In 2024 IEEE 37th Computer Security Foundations Symposium (CSF). IEEE, 2024. http://dx.doi.org/10.1109/csf61375.2024.00051.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kulshrestha, Sony, Nishtha Acharya, Raneeta Pal, and Lucky Vijayvargiya. "IoT and Cybersecurity Regulations: Compliance and Risk Management Strategies." In 2024 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES). IEEE, 2024. https://doi.org/10.1109/icses63760.2024.10910714.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Eltaeib, Tarik, Shakour Abuzneid, and Khaled Elleithy. "Proposed Framework for a Comprehensive Cybersecurity Risk Management Strategy." In 2024 IEEE Long Island Systems, Applications and Technology Conference (LISAT). IEEE, 2024. https://doi.org/10.1109/lisat63094.2024.10808119.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mailewa, Akalanka B., Mohan Kumar Gajula, Arunkumar Akuthota, and Thivanka M. Dissanayake Mohottalalage. "IoT Risk Management in the Digital Economy: A Cybersecurity Perspective." In 2025 IEEE 15th Annual Computing and Communication Workshop and Conference (CCWC). IEEE, 2025. https://doi.org/10.1109/ccwc62904.2025.10903706.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Farouk, Suleiman, Chandrashekhar Uppin, and Gilbert George. "Enhancing Cybersecurity in Nigeria: A Proposed Risk Management Framework for Universities." In 2024 International Conference on Science, Engineering and Business for Driving Sustainable Development Goals (SEB4SDG). IEEE, 2024. http://dx.doi.org/10.1109/seb4sdg60871.2024.10629748.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Malinowska, Katarzyna, and Michal Szwajewski. "Cyber Insurance for Cybersecurity in Space Systems. Building Efficient Risk Management Ecosystem." In 57th IAA Symposium on Safety, Quality and Knowledge Management in Space Activities, Held at the 75th International Astronautical Congress (IAC 2024). International Astronautical Federation (IAF), 2024. https://doi.org/10.52202/078376-0031.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Dharmireddi, Srinivasarao, Ammar Hameed, Mustafa Albdairi, Eko G. Samudro, and Manish Nandy. "Cybersecurity in Digital Finance: Artificial Intelligence-Powered Fraud Detection and Risk Management." In 2025 International Conference on Computational Innovations and Engineering Sustainability (ICCIES). IEEE, 2025. https://doi.org/10.1109/iccies63851.2025.11032566.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zou, Xiao, and Xueliang Wu. "An Association Rule with Split Aggregate Merge Algorithm for Insurance Risk Management." In 2024 International Conference on Distributed Systems, Computer Networks and Cybersecurity (ICDSCNC). IEEE, 2024. https://doi.org/10.1109/icdscnc62492.2024.10939335.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Cybersecurity risk management"

1

Quinn, Stephen, Nahla Ivy, Matthew Barrett, Greg Witte, and R. K. Gardner. Prioritizing Cybersecurity Risk for Enterprise Risk Management. National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.ir.8286b.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Quinn, Stephen. Prioritizing Cybersecurity Risk for Enterprise Risk Management. National Institute of Standards and Technology, 2025. https://doi.org/10.6028/nist.ir.8286b-upd1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

McWhite, Rebecca. NIST Cybersecurity Supply Chain Risk Management:. National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.sp.1326.ipd.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Quinn, Stephen, Nahla Ivy, Matthew Barrett, Larry Feldman, Greg Witte, and R. K. Gardner. Identifying and Estimating Cybersecurity Risk for Enterprise Risk Management. National Institute of Standards and Technology, 2021. http://dx.doi.org/10.6028/nist.ir.8286a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Quinn, Stephen. Identifying and Estimating Cybersecurity Risk for Enterprise Risk Management. National Institute of Standards and Technology, 2025. https://doi.org/10.6028/nist.ir.8286ar1.ipd.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Stine, Kevin, Stephen Quinn, Greg Witte, and R. K. Gardner. Integrating Cybersecurity and Enterprise Risk Management (ERM). National Institute of Standards and Technology, 2020. http://dx.doi.org/10.6028/nist.ir.8286.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Barker, William C., Karen Scarfone, William Fisher, and Murugiah Souppaya. Cybersecurity Framework Profile for Ransomware Risk Management. National Institute of Standards and Technology, 2021. http://dx.doi.org/10.6028/nist.ir.8374-draft.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Quinn, Stephen. Integrating Cybersecurity and Enterprise Risk Management (ERM). National Institute of Standards and Technology, 2025. https://doi.org/10.6028/nist.ir.8286r1.ipd.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Quinn, Stephen, Nahla Ivy, Matthew Barrett, Greg Witte, and R. K. Gardner. Staging Cybersecurity Risks for Enterprise Risk Management and Governance Oversight. National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.ir.8286c-draft.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Quinn, Stephen. Staging Cybersecurity Risks for Enterprise Risk Management and Governance Oversight. National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.ir.8286c.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!