Risk Mitigation

Risk mitigation forms a critical part of any organization's cybersecurity strategy. This chapter delves into the fundamentals of understanding and developing effective risk mitigation strategies, from choosing the right controls to implementing them effectively. It explores methods to mitigate...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Weaver, Griffin, Edwards, Jason
Format: Buchkapitel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 480
container_issue
container_start_page 463
container_title
container_volume
creator Weaver, Griffin
Edwards, Jason
description Risk mitigation forms a critical part of any organization's cybersecurity strategy. This chapter delves into the fundamentals of understanding and developing effective risk mitigation strategies, from choosing the right controls to implementing them effectively. It explores methods to mitigate interconnectivity risks and the application of user security controls. Policies, standards, and procedures articulate an organization's expectations concerning its security posture. Asset management processes are crucial in maintaining the asset inventory and classification. Asset risk assessment is a vital part of the asset management process. Interconnectivity risks extend to using Application Programming Interfaces, as they form the bridges connecting disparate systems and services. User controls are vital to an organization's overall security framework as they manage the potential risks arising from users of its systems and data. A robust change management process is a critical risk mitigation strategy that can have profound implications for the organization's resilience and long‐term success.
doi_str_mv 10.1002/9781394250226.ch26
format Book Chapter
fullrecord <record><control><sourceid>proquest_wiley</sourceid><recordid>TN_cdi_wiley_ebooks_10_1002_9781394250226_ch26_ch26</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EBC31201269_350_493</sourcerecordid><originalsourceid>FETCH-LOGICAL-b1666-d671aae9ede8dfc29bc253e3f8e27983ddfefb65c00e2c144bd8437193a3b1c23</originalsourceid><addsrcrecordid>eNpVj01Lw0AQhldEUWvw7sk_kDqzk2x2j1K0ChVB9Lzsx8TGlqZmI-K_NzU96GVm3oFnmEeIS4QpAshrU2kkU8gSpFTTsJTqQGR_lmgOxdk-oKHjIQxjZVBpcyKylN4BgAAlAZyKi-cmra4em755c33Tbs7FUe3WibN9n4jXu9uX2X2-eJo_zG4WuUelVB5Vhc6x4cg61kEaH2RJTLVmWRlNMdZce1UGAJYBi8JHXVA1_OPIY5A0ETTe_WrW_G3Zt-0qWQS7c7T_HO3O8bcMVDlS2679-OTUj2DgTd-5dVi6bc9dsoRy8FPGUgm2MEQ_LqJTfw</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>book_chapter</recordtype><pqid>EBC31201269_350_493</pqid></control><display><type>book_chapter</type><title>Risk Mitigation</title><source>O'Reilly Online Learning: Academic/Public Library Edition</source><creator>Weaver, Griffin ; Edwards, Jason</creator><contributor>Edwards, Jason ; Weaver, Griffin</contributor><creatorcontrib>Weaver, Griffin ; Edwards, Jason ; Edwards, Jason ; Weaver, Griffin</creatorcontrib><description>Risk mitigation forms a critical part of any organization's cybersecurity strategy. This chapter delves into the fundamentals of understanding and developing effective risk mitigation strategies, from choosing the right controls to implementing them effectively. It explores methods to mitigate interconnectivity risks and the application of user security controls. Policies, standards, and procedures articulate an organization's expectations concerning its security posture. Asset management processes are crucial in maintaining the asset inventory and classification. Asset risk assessment is a vital part of the asset management process. Interconnectivity risks extend to using Application Programming Interfaces, as they form the bridges connecting disparate systems and services. User controls are vital to an organization's overall security framework as they manage the potential risks arising from users of its systems and data. A robust change management process is a critical risk mitigation strategy that can have profound implications for the organization's resilience and long‐term success.</description><identifier>ISBN: 1394250193</identifier><identifier>ISBN: 9781394250196</identifier><identifier>EISBN: 9781394250219</identifier><identifier>EISBN: 1394250215</identifier><identifier>EISBN: 1394250223</identifier><identifier>EISBN: 9781394250226</identifier><identifier>DOI: 10.1002/9781394250226.ch26</identifier><identifier>OCLC: 1425791689</identifier><identifier>LCCallNum: HD30.38 .E393 2024</identifier><language>eng</language><publisher>United Kingdom: John Wiley &amp; Sons, Incorporated</publisher><subject>asset management ; change management process ; interconnectivity risks ; risk mitigation ; security controls ; user controls</subject><ispartof>The Cybersecurity Guide to Governance, Risk, and Compliance, 2024, p.463-480</ispartof><rights>2024 John Wiley &amp; Sons, Ltd</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttps://ebookcentral.proquest.com/covers/31201269-l.jpg</thumbnail><link.rule.ids>779,780,784,793,27924</link.rule.ids></links><search><contributor>Edwards, Jason</contributor><contributor>Weaver, Griffin</contributor><creatorcontrib>Weaver, Griffin</creatorcontrib><creatorcontrib>Edwards, Jason</creatorcontrib><title>Risk Mitigation</title><title>The Cybersecurity Guide to Governance, Risk, and Compliance</title><description>Risk mitigation forms a critical part of any organization's cybersecurity strategy. This chapter delves into the fundamentals of understanding and developing effective risk mitigation strategies, from choosing the right controls to implementing them effectively. It explores methods to mitigate interconnectivity risks and the application of user security controls. Policies, standards, and procedures articulate an organization's expectations concerning its security posture. Asset management processes are crucial in maintaining the asset inventory and classification. Asset risk assessment is a vital part of the asset management process. Interconnectivity risks extend to using Application Programming Interfaces, as they form the bridges connecting disparate systems and services. User controls are vital to an organization's overall security framework as they manage the potential risks arising from users of its systems and data. A robust change management process is a critical risk mitigation strategy that can have profound implications for the organization's resilience and long‐term success.</description><subject>asset management</subject><subject>change management process</subject><subject>interconnectivity risks</subject><subject>risk mitigation</subject><subject>security controls</subject><subject>user controls</subject><isbn>1394250193</isbn><isbn>9781394250196</isbn><isbn>9781394250219</isbn><isbn>1394250215</isbn><isbn>1394250223</isbn><isbn>9781394250226</isbn><fulltext>true</fulltext><rsrctype>book_chapter</rsrctype><creationdate>2024</creationdate><recordtype>book_chapter</recordtype><recordid>eNpVj01Lw0AQhldEUWvw7sk_kDqzk2x2j1K0ChVB9Lzsx8TGlqZmI-K_NzU96GVm3oFnmEeIS4QpAshrU2kkU8gSpFTTsJTqQGR_lmgOxdk-oKHjIQxjZVBpcyKylN4BgAAlAZyKi-cmra4em755c33Tbs7FUe3WibN9n4jXu9uX2X2-eJo_zG4WuUelVB5Vhc6x4cg61kEaH2RJTLVmWRlNMdZce1UGAJYBi8JHXVA1_OPIY5A0ETTe_WrW_G3Zt-0qWQS7c7T_HO3O8bcMVDlS2679-OTUj2DgTd-5dVi6bc9dsoRy8FPGUgm2MEQ_LqJTfw</recordid><startdate>2024</startdate><enddate>2024</enddate><creator>Weaver, Griffin</creator><creator>Edwards, Jason</creator><general>John Wiley &amp; Sons, Incorporated</general><general>John Wiley &amp; Sons, Ltd</general><scope>FFUUA</scope></search><sort><creationdate>2024</creationdate><title>Risk Mitigation</title><author>Weaver, Griffin ; Edwards, Jason</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-b1666-d671aae9ede8dfc29bc253e3f8e27983ddfefb65c00e2c144bd8437193a3b1c23</frbrgroupid><rsrctype>book_chapters</rsrctype><prefilter>book_chapters</prefilter><language>eng</language><creationdate>2024</creationdate><topic>asset management</topic><topic>change management process</topic><topic>interconnectivity risks</topic><topic>risk mitigation</topic><topic>security controls</topic><topic>user controls</topic><toplevel>online_resources</toplevel><creatorcontrib>Weaver, Griffin</creatorcontrib><creatorcontrib>Edwards, Jason</creatorcontrib><collection>ProQuest Ebook Central - Book Chapters - Demo use only</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Weaver, Griffin</au><au>Edwards, Jason</au><au>Edwards, Jason</au><au>Weaver, Griffin</au><format>book</format><genre>bookitem</genre><ristype>CHAP</ristype><atitle>Risk Mitigation</atitle><btitle>The Cybersecurity Guide to Governance, Risk, and Compliance</btitle><date>2024</date><risdate>2024</risdate><spage>463</spage><epage>480</epage><pages>463-480</pages><isbn>1394250193</isbn><isbn>9781394250196</isbn><eisbn>9781394250219</eisbn><eisbn>1394250215</eisbn><eisbn>1394250223</eisbn><eisbn>9781394250226</eisbn><abstract>Risk mitigation forms a critical part of any organization's cybersecurity strategy. This chapter delves into the fundamentals of understanding and developing effective risk mitigation strategies, from choosing the right controls to implementing them effectively. It explores methods to mitigate interconnectivity risks and the application of user security controls. Policies, standards, and procedures articulate an organization's expectations concerning its security posture. Asset management processes are crucial in maintaining the asset inventory and classification. Asset risk assessment is a vital part of the asset management process. Interconnectivity risks extend to using Application Programming Interfaces, as they form the bridges connecting disparate systems and services. User controls are vital to an organization's overall security framework as they manage the potential risks arising from users of its systems and data. A robust change management process is a critical risk mitigation strategy that can have profound implications for the organization's resilience and long‐term success.</abstract><cop>United Kingdom</cop><pub>John Wiley &amp; Sons, Incorporated</pub><doi>10.1002/9781394250226.ch26</doi><oclcid>1425791689</oclcid><tpages>18</tpages></addata></record>
fulltext fulltext
identifier ISBN: 1394250193
ispartof The Cybersecurity Guide to Governance, Risk, and Compliance, 2024, p.463-480
issn
language eng
recordid cdi_wiley_ebooks_10_1002_9781394250226_ch26_ch26
source O'Reilly Online Learning: Academic/Public Library Edition
subjects asset management
change management process
interconnectivity risks
risk mitigation
security controls
user controls
title Risk Mitigation
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T15%3A43%3A05IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_wiley&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=bookitem&rft.atitle=Risk%20Mitigation&rft.btitle=The%20Cybersecurity%20Guide%20to%20Governance,%20Risk,%20and%20Compliance&rft.au=Weaver,%20Griffin&rft.date=2024&rft.spage=463&rft.epage=480&rft.pages=463-480&rft.isbn=1394250193&rft.isbn_list=9781394250196&rft_id=info:doi/10.1002/9781394250226.ch26&rft_dat=%3Cproquest_wiley%3EEBC31201269_350_493%3C/proquest_wiley%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781394250219&rft.eisbn_list=1394250215&rft.eisbn_list=1394250223&rft.eisbn_list=9781394250226&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=EBC31201269_350_493&rft_id=info:pmid/&rfr_iscdi=true