Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Title Page Copyright Contents Foreword, David Thodey AO Introduction, Ken Lay AO The authors That was then, this is now Element 1
Cyber is a business risk, not an IT problem
Element 2
Taking a risk-based approach to governing cyber security ‘The business’ contributing to cyber risk The role of the board before, during, and after a cyber security incident
Element 3
Creating a cyber safe business with a cyber security strategy
Element 4
Meaningful metrics, measurement, and reporting
Element 5
Understanding the role of the CISO (and whether you need one)
Continous learning for governing cyber risk
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion