Academic literature on the topic 'Cybersecurity risk management'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cybersecurity risk management.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cybersecurity risk management"
Eaton, Tim V., Jonathan H. Grenier, and David Layman. "Accounting and Cybersecurity Risk Management." Current Issues in Auditing 13, no. 2 (2019): C1—C9. http://dx.doi.org/10.2308/ciia-52419.
Full textJafarov, N. "REDUCING CYBERSECURITY RISKS BY AUTOMATIZING RISK MANAGEMENT." Znanstvena misel journal, no. 97 (December 30, 2024): 52–55. https://doi.org/10.5281/zenodo.14575450.
Full textBriscoe, Christopher, and Carl Young. "Scale, Complexity, and Cybersecurity Risk Management." Journal of Information Security 15, no. 04 (2024): 524–44. http://dx.doi.org/10.4236/jis.2024.154029.
Full textBurrell, Darrell Norman. "Understanding Healthcare Cybersecurity Risk Management Complexity." Land Forces Academy Review 29, no. 1 (2024): 38–49. http://dx.doi.org/10.2478/raft-2024-0004.
Full textAlmaiah, Mohammed Amin. "Editorial: STAP Journal of Security Risk Management." STAP Journal of Security Risk Management 2023, no. 1 (2023): 1–2. https://doi.org/10.63180/jsrm.thestap.2023.1.1.
Full textOlawoyin, Olayinka Michael. "Blockchain Technology in Risk Management: Strengthening Cybersecurity and Financial Integrity." International Journal of Research Publication and Reviews 5, no. 10 (2024): 2336–48. http://dx.doi.org/10.55248/gengpi.5.1024.2829.
Full textGruba, Łukasz. "Cybersecurity risk assessment in railway applications." WUT Journal of Transportation Engineering 137 (December 1, 2023): 153–65. https://doi.org/10.5604/01.3001.0054.9040.
Full textKure, Halima Ibrahim, and Shareeful Islam. "Assets focus risk management framework for critical infrastructure cybersecurity risk management." IET Cyber-Physical Systems: Theory & Applications 4, no. 4 (2019): 332–40. http://dx.doi.org/10.1049/iet-cps.2018.5079.
Full textLi, He, Won Gyun No, and Tawei Wang. "SEC's cybersecurity disclosure guidance and disclosed cybersecurity risk factors." International Journal of Accounting Information Systems 30 (September 2018): 40–55. http://dx.doi.org/10.1016/j.accinf.2018.06.003.
Full textKeskin, Omer F., Kevin Matthe Caramancion, Irem Tatar, Owais Raza, and Unal Tatar. "Cyber Third-Party Risk Management: A Comparison of Non-Intrusive Risk Scoring Reports." Electronics 10, no. 10 (2021): 1168. http://dx.doi.org/10.3390/electronics10101168.
Full textDissertations / Theses on the topic "Cybersecurity risk management"
Murray, Glenn Kristian. "Managing cybersecurity risk for critical infrastructure: A framework to secure critical infrastructure." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2024. https://ro.ecu.edu.au/theses/2864.
Full textRassega, Valter. "Cyber security risk management nei servizi pubblici strategici." Doctoral thesis, Universita degli studi di Salerno, 2017. http://hdl.handle.net/10556/2571.
Full textSteinbernreiter, Kajsa. ""The cyber war" : A qualitative study investigating the management of cybersecurity in Swedish online fashion companies." Thesis, Högskolan i Borås, Akademin för textil, teknik och ekonomi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-22101.
Full textBaker, Wade Henderson. "Toward a Decision Support System for Measuring and Managing Cybersecurity Risk in Supply Chains." Diss., Virginia Tech, 2017. http://hdl.handle.net/10919/85128.
Full textGao, Olivia Qing. "Risk Assessment for IoT : a system evaluation of the smart home and its cybersecurity imperative." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/106247.
Full textStefanska, Beata, and Fatimah Laura Al-Dawod. "The importance of risk awareness in cybersecurity among companies : A perspective on the role of top management." Thesis, Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177218.
Full textArowolo, Olatunji Mujib. "Strategic Cyber-Risk Implications of Cloud Technology Adoption in the U.S. Financial Services Sector." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4347.
Full textAbu-Shaqra, Baha. "Technoethics and Sensemaking: Risk Assessment and Knowledge Management of Ethical Hacking in a Sociotechnical Society." Thesis, Université d'Ottawa / University of Ottawa, 2020. http://hdl.handle.net/10393/40393.
Full textTakacs, Gergely. "Integration of CTI into security management." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-74246.
Full textCurran, Theresa. "Standardizing Instructional Definition and Content Supporting Information Security Compliance Requirements." Diss., NSUWorks, 2018. https://nsuworks.nova.edu/gscis_etd/1038.
Full textBooks on the topic "Cybersecurity risk management"
Rohmeyer, Paul, and Jennifer L. Bayuk. Financial Cybersecurity Risk Management. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4194-3.
Full textUnited States. Congress. House. Committee on Homeland Security. Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies. Protecting the homeland from nuclear and radiological threats: Hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, second session, July 29, 2014. U.S. Government Publishing Office, 2015.
Find full textStepping Through Cybersecurity Risk Management. Wiley & Sons, Incorporated, John, 2023.
Find full textStepping Through Cybersecurity Risk Management. Wiley & Sons, Incorporated, John, 2023.
Find full textStepping Through Cybersecurity Risk Management. Wiley & Sons, Incorporated, John, 2023.
Find full textOh, Kok-Boon. Cybersecurity Risk Management: An ERM Approach. Nova Science Publishers, Incorporated, 2021.
Find full textOh, Kok-Boon. Cybersecurity Risk Management: An ERM Approach. Nova Science Publishers, Incorporated, 2022.
Find full textKissoon, Tara. Optimal Spending on Cybersecurity Measures: Risk Management. Taylor & Francis Group, 2021.
Find full textBlokdyk, Gerardus. Cybersecurity Risk Management Complete Self-Assessment Guide. Createspace Independent Publishing Platform, 2017.
Find full textBook chapters on the topic "Cybersecurity risk management"
Jøsang, Audun. "Cyber Risk Management." In Cybersecurity. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-68483-8_19.
Full textRefsdal, Atle, Bjørnar Solhaug, and Ketil Stølen. "Cybersecurity." In Cyber-Risk Management. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23570-7_4.
Full textWatters, Paul A. "Risk Management." In Cybercrime and Cybersecurity. CRC Press, 2023. http://dx.doi.org/10.1201/9781003406730-2.
Full textKissoon, Tara. "Cybersecurity Risk Management Framework." In Optimal Spending on Cybersecurity Measures. CRC Press, 2024. http://dx.doi.org/10.1201/9781003497523-6.
Full textKissoon, Tara. "Cybersecurity risk-management framework." In Optimal Spending on Cybersecurity Measures. Routledge, 2021. http://dx.doi.org/10.4324/9781003200895-7.
Full textKissoon, Tara. "Cybersecurity Risk Management Framework." In Optimal Spending on Cybersecurity Measures. CRC Press, 2025. https://doi.org/10.1201/9781003587576-7.
Full textKissoon, Tara. "Cybersecurity Risk Management Framework." In Optimal Spending on Cybersecurity Measures. CRC Press, 2025. https://doi.org/10.1201/9781003587569-7.
Full textKissoon, Tara. "Cybersecurity Risk Management Framework." In Optimal Spending on Cybersecurity Measures. CRC Press, 2025. https://doi.org/10.1201/9781003527213-6.
Full textKissoon, Tara. "AI Risk Management." In Optimal Spending on Cybersecurity Measures. CRC Press, 2025. https://doi.org/10.1201/9781003587569-6.
Full textKissoon, Tara. "Risk-management practice – vulnerability management." In Optimal Spending on Cybersecurity Measures. Routledge, 2021. http://dx.doi.org/10.4324/9781003200895-4.
Full textConference papers on the topic "Cybersecurity risk management"
Marek, James. "Cybersecurity and Risk Management Framework in Avionics." In Vertical Flight Society 74th Annual Forum & Technology Display. The Vertical Flight Society, 2018. http://dx.doi.org/10.4050/f-0074-2018-12893.
Full textJabbar, Haidar, Samir Al-Janabi, and Francis Syms. "AI-Integrated Cyber Security Risk Management Framework for IT Projects." In 2024 International Jordanian Cybersecurity Conference (IJCC). IEEE, 2024. https://doi.org/10.1109/ijcc64742.2024.10847294.
Full textMann, Zoltán Ádám. "Urgency in Cybersecurity Risk Management: Toward a Solid Theory." In 2024 IEEE 37th Computer Security Foundations Symposium (CSF). IEEE, 2024. http://dx.doi.org/10.1109/csf61375.2024.00051.
Full textKulshrestha, Sony, Nishtha Acharya, Raneeta Pal, and Lucky Vijayvargiya. "IoT and Cybersecurity Regulations: Compliance and Risk Management Strategies." In 2024 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES). IEEE, 2024. https://doi.org/10.1109/icses63760.2024.10910714.
Full textEltaeib, Tarik, Shakour Abuzneid, and Khaled Elleithy. "Proposed Framework for a Comprehensive Cybersecurity Risk Management Strategy." In 2024 IEEE Long Island Systems, Applications and Technology Conference (LISAT). IEEE, 2024. https://doi.org/10.1109/lisat63094.2024.10808119.
Full textMailewa, Akalanka B., Mohan Kumar Gajula, Arunkumar Akuthota, and Thivanka M. Dissanayake Mohottalalage. "IoT Risk Management in the Digital Economy: A Cybersecurity Perspective." In 2025 IEEE 15th Annual Computing and Communication Workshop and Conference (CCWC). IEEE, 2025. https://doi.org/10.1109/ccwc62904.2025.10903706.
Full textFarouk, Suleiman, Chandrashekhar Uppin, and Gilbert George. "Enhancing Cybersecurity in Nigeria: A Proposed Risk Management Framework for Universities." In 2024 International Conference on Science, Engineering and Business for Driving Sustainable Development Goals (SEB4SDG). IEEE, 2024. http://dx.doi.org/10.1109/seb4sdg60871.2024.10629748.
Full textMalinowska, Katarzyna, and Michal Szwajewski. "Cyber Insurance for Cybersecurity in Space Systems. Building Efficient Risk Management Ecosystem." In 57th IAA Symposium on Safety, Quality and Knowledge Management in Space Activities, Held at the 75th International Astronautical Congress (IAC 2024). International Astronautical Federation (IAF), 2024. https://doi.org/10.52202/078376-0031.
Full textDharmireddi, Srinivasarao, Ammar Hameed, Mustafa Albdairi, Eko G. Samudro, and Manish Nandy. "Cybersecurity in Digital Finance: Artificial Intelligence-Powered Fraud Detection and Risk Management." In 2025 International Conference on Computational Innovations and Engineering Sustainability (ICCIES). IEEE, 2025. https://doi.org/10.1109/iccies63851.2025.11032566.
Full textZou, Xiao, and Xueliang Wu. "An Association Rule with Split Aggregate Merge Algorithm for Insurance Risk Management." In 2024 International Conference on Distributed Systems, Computer Networks and Cybersecurity (ICDSCNC). IEEE, 2024. https://doi.org/10.1109/icdscnc62492.2024.10939335.
Full textReports on the topic "Cybersecurity risk management"
Quinn, Stephen, Nahla Ivy, Matthew Barrett, Greg Witte, and R. K. Gardner. Prioritizing Cybersecurity Risk for Enterprise Risk Management. National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.ir.8286b.
Full textQuinn, Stephen. Prioritizing Cybersecurity Risk for Enterprise Risk Management. National Institute of Standards and Technology, 2025. https://doi.org/10.6028/nist.ir.8286b-upd1.
Full textMcWhite, Rebecca. NIST Cybersecurity Supply Chain Risk Management:. National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.sp.1326.ipd.
Full textQuinn, Stephen, Nahla Ivy, Matthew Barrett, Larry Feldman, Greg Witte, and R. K. Gardner. Identifying and Estimating Cybersecurity Risk for Enterprise Risk Management. National Institute of Standards and Technology, 2021. http://dx.doi.org/10.6028/nist.ir.8286a.
Full textQuinn, Stephen. Identifying and Estimating Cybersecurity Risk for Enterprise Risk Management. National Institute of Standards and Technology, 2025. https://doi.org/10.6028/nist.ir.8286ar1.ipd.
Full textStine, Kevin, Stephen Quinn, Greg Witte, and R. K. Gardner. Integrating Cybersecurity and Enterprise Risk Management (ERM). National Institute of Standards and Technology, 2020. http://dx.doi.org/10.6028/nist.ir.8286.
Full textBarker, William C., Karen Scarfone, William Fisher, and Murugiah Souppaya. Cybersecurity Framework Profile for Ransomware Risk Management. National Institute of Standards and Technology, 2021. http://dx.doi.org/10.6028/nist.ir.8374-draft.
Full textQuinn, Stephen. Integrating Cybersecurity and Enterprise Risk Management (ERM). National Institute of Standards and Technology, 2025. https://doi.org/10.6028/nist.ir.8286r1.ipd.
Full textQuinn, Stephen, Nahla Ivy, Matthew Barrett, Greg Witte, and R. K. Gardner. Staging Cybersecurity Risks for Enterprise Risk Management and Governance Oversight. National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.ir.8286c-draft.
Full textQuinn, Stephen. Staging Cybersecurity Risks for Enterprise Risk Management and Governance Oversight. National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.ir.8286c.
Full text