Enterprise cyber risk management as a value creator: leverage cybersecurity for competitive advantage (Record no. 63898)

MARC details
000 -LEADER
fixed length control field 03131 a2200241 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 251212b |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9798868800931
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 658.478 CHA
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Chaput, Bob
245 ## - TITLE STATEMENT
Title Enterprise cyber risk management as a value creator: leverage cybersecurity for competitive advantage
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc New York:
Name of publisher, distributor, etc Springer,
Date of publication, distribution, etc 2024.
300 ## - PHYSICAL DESCRIPTION
Extent XIiii, 388p.:
Other physical details ill.; pbk.:
Dimensions 24 cm.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes Index
520 ## - SUMMARY, ETC.
Summary, etc This book will help you learn the importance of organizations treating enterprise cyber risk management (ECRM) as a value creator, a business enabler, and a mechanism to create a competitive advantage. Organizations began to see the real value of information and information technology in the mid-1980s. Forty years later, it’s time to leverage your ECRM program and cybersecurity strategy in the same way.<br/><br/>The main topics covered include the case for action with specific coverage on the topic of cybersecurity as a value creator, including how the courts, legislators, and regulators are raising the bar for C-suite executives and board members. The book covers how the board’s three primary responsibilities (talent management, strategy, and risk management) intersect with their ECRM responsibilities.<br/><br/>ECRM was once solely focused on managing the downside of risk by defending the organization from adversarial, accidental, structural, and environmental threat sources. Author BobChaput presents the view that we must focus equally on managing the upside of cyber strengths to increase customer trust and brand loyalty, improving social responsibility, driving revenue growth, lowering the cost of capital, attracting higher quality investments, creating competitive advantage, attracting and retaining talent, and facilitating M&A work. He focuses on the C-suite and board role in the first part and provides guidance on their roles and responsibilities, the most important decision about ECRM they must facilitate, and how to think differently about ECRM funding. You will learn how to the pivot from cost-center thinking to value-center thinking.<br/><br/>Having built the case for action, in the second part, the book details the steps that organizations must take to develop and document their ECRM program and cybersecurity strategy. The book first covers how ECRM must be integrated into business strategy. The remainder of that part presents a sample table of contents for an ECRM Program and Cybersecurity Strategy document and works through each section to facilitate development of your own program and strategy. With all the content and ideas presented, you will be able to establish, implement, and mature your program and strategy.<br/><br/>https://link.springer.com/book/10.1007/979-8-8688-0094-8#overview
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Enterprise Cyber Risk Management
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cybersecurity as Value Creator
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Business Strategy and Cyber Risk
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element C-Suite and Board Responsibilities
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Risk Management and Governance
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cyber Strengths and Competitive Advantage
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Item type Books
Source of classification or shelving scheme Dewey Decimal Classification
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Date acquired Source of acquisition Cost, normal purchase price Total Checkouts Full call number Barcode Date last seen Copy number Cost, replacement price Koha item type
    Dewey Decimal Classification     General IIT Gandhinagar IIT Gandhinagar 10/12/2025 CBS publishers 3892.98   658.478 CHA 036504 10/12/2025 1 3892.98 Books


Copyright ©  2022 IIT Gandhinagar Library. All Rights Reserved.