How to Measure Anything in Cybersecurity Risk

, by ;
How to Measure Anything in Cybersecurity Risk by Hubbard, Douglas W.; Seiersen, Richard, 9781119892304
Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
  • ISBN: 9781119892304 | 1119892309
  • Cover: Hardcover
  • Copyright: 4/11/2023

  • Rent

    (Recommended)

    $27.69
     
    Term
    Due
    Price
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.
  • Buy New

    Currently Available, Usually Ships in 24-48 Hours

    $63.04
  • eBook

    eTextBook from VitalSource Icon

    Available Instantly

    Online: 1825 Days

    Downloadable: Lifetime Access

    $40.50

A start-to-finish guide for realistically measuring cybersecurity risk

In the newly revised How to Measure Anything in Cybersecurity Risk, Second Edition, a pioneering information security professional and a leader in quantitative analysis methods delivers yet another eye-opening text applying the quantitative language of risk analysis to cybersecurity. In the book, the authors demonstrate how to quantify uncertainty and shed light on how to measure seemingly intangible goals. It's a practical guide to improving risk assessment with a straightforward and simple framework.

Advanced methods and detailed advice for a variety of use cases round out the book, which also includes:

  • A new "Rapid Risk Audit" for a first quick quantitative risk assessment.
  • New research on the real impact of reputation damage
  • New Bayesian examples for assessing risk with little data
  • New material on simple measurement and estimation, pseudo-random number generators, and advice on combining expert opinion

Dispelling long-held beliefs and myths about information security, How to Measure Anything in Cybersecurity Risk is an essential roadmap for IT security managers, CFOs, risk and compliance professionals, and even statisticians looking for novel new ways to apply quantitative techniques to cybersecurity.

Loading Icon

Please wait while the item is added to your bag...
Continue Shopping Button
Checkout Button
Loading Icon
Continue Shopping Button