- Provides guidance on managing common threats to confidentiality, integrity and availability including malware, data leakage, insider threat and Denial-of-Service
- Includes examples and use cases including Yahoo, Facebook and TalkTalk, along with implementation review checklists at the end of each chapter
- Explores how to prioritize relevant risks rather than those sensationalized by the media
- Covers human factors around cyber risk and how they impact employee training and cyber awareness
- Contains interviews with leading security and risk professionals from a variety of industries