Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Table of Contents
Notes on Contributors
Acknowledgments
Introduction
I.1 Making Sense of Cybersecurity Governance
I.2 Connective Tissue: Common Themes
1 Cybersecurity Information‐Sharing Governance Structures
1.1 Introduction
1.2 Taxonomy of Information‐sharing Governance Structures and Policies
1.3 Discussion and Conclusions
Acknowledgments
2 Cybersecurity Governance in the GCC
2.1 Introduction
2.2 Why the GCC?
2.3 Key Cybersecurity Incidents
2.4 Government Organizations
2.5 Strategies, Laws, and Standards
2.6 The Cybersecurity Industry
2.7 Conclusion
Acknowlegments
3 The United Kingdom's Emerging Internet of Things (IoT) Policy Landscape
3.1 Introduction
3.2 The IoT's Risks and Uncertainties
3.3 Adaptive Policymaking in the Context of IoT
3.4 The UK Policy Landscape
3.5 The IoT and its Governance Challenges
3.6 Conclusion
4 Birds of a Feather
4.1 Introduction: The Challenge of Ecosystem Risk
4.2 Progress So Far
4.3 Aviation's Tools for Cyber Risk Governance
4.4 The Path Forward
4.5 Conclusion
5 An Incident‐Based Conceptualization of Cybersecurity Governance*
5.1 Introduction
5.2 Conceptualizing Cybersecurity Governance
5.3 Case Studies
5.4 Utility and Limitations
5.5 Conclusion
6 Cyber Governance and the Financial Services Sector
6.1 Introduction
6.2 Governance, Security, and Critical Infrastructure Protection
6.3 Financial Services Information Sharing and Analysis Center
6.4 Financial Services Sector Coordinating Council
6.5 Financial Systemic Analysis and Resilience Center
6.6 Lessons for Cybersecurity Governance
6.7 Conclusion
Acknowledgments
7 The Regulation of Botnets
7.1 Introduction
7.2 Cybersecurity
7.3 Botnets
7.4 Governance Theory
7.5 Discussion: Governance Theory Applied to Botnet Mitigation
7.6 Conclusion
Acknowledgment
8 Governing Risk
8.1 Introduction
8.2 Where Did Cyber Insurance Come From?
8.3 Security Standards in the Governance Process
8.4 The Key Role of Risk
8.5 Enforcing Standards: Insurance Becomes Governance
8.6 Conclusion and Implications
9 Containing Conficker
9.1 Introduction
9.2 The Conficker Infection
9.3 A Public Health Alternative
9.4 A Public Health Approach to Conficker
9.5 Conclusion
10 Bug Bounty Programs
10.1 Introduction: Conspicuously Absent
10.2 Scope and Aims
10.3 A Market for Flaws: Bug Bounty Programs
10.4 Conclusion
11 Rethinking Data, Geography, and Jurisdiction
11.1 Introduction
11.2 The Challenge of Extraterritorial Data
11.3 The Threat of Data Localization
11.4 A New Approach to Data Flow Controls
11.5 Recommendations
11.6 Additional Challenges
11.7 Conclusion
Acknowledgments
12 Private Ordering Shaping Cybersecurity Policy
12.1 Introduction
12.2 Are Bug Bounties Operating as a “Private” Safe Harbor? Key Findings of the Legal Terms Survey
12.3 Policy Recommendations: Toward a Private Safe Harbor
12.4 Conclusion
Acknowledgments
Bibliography
Index
End User License Agreement
← Prev
Back
Next →
← Prev
Back
Next →