Digital Asset Valuation and Cyber Risk Measurement

Digital Asset Valuation and Cyber Risk Measurement
Author: Keyun Ruan
Publsiher: Academic Press
Total Pages: 200
Release: 2019-05-29
ISBN 10: 0128123281
ISBN 13: 9780128123287
Language: EN, FR, DE, ES & NL

Digital Asset Valuation and Cyber Risk Measurement Book Review:

Digital Asset Valuation and Cyber Risk Measurement: Principles of Cybernomics is a book about the future of risk and the future of value. It examines the indispensable role of economic modeling in the future of digitization, thus providing industry professionals with the tools they need to optimize the management of financial risks associated with this megatrend. The book addresses three problem areas: the valuation of digital assets, measurement of risk exposures of digital valuables, and economic modeling for the management of such risks. Employing a pair of novel cyber risk measurement units, bitmort and hekla, the book covers areas of value, risk, control, and return, each of which are viewed from the perspective of entity (e.g., individual, organization, business), portfolio (e.g., industry sector, nation-state), and global ramifications. Establishing adequate, holistic, and statistically robust data points on the entity, portfolio, and global levels for the development of a cybernomics databank is essential for the resilience of our shared digital future. This book also argues existing economic value theories no longer apply to the digital era due to the unique characteristics of digital assets. It introduces six laws of digital theory of value, with the aim to adapt economic value theories to the digital and machine era. Comprehensive literature review on existing digital asset valuation models, cyber risk management methods, security control frameworks, and economics of information security Discusses the implication of classical economic theories under the context of digitization, as well as the impact of rapid digitization on the future of value Analyzes the fundamental attributes and measurable characteristics of digital assets as economic goods Discusses the scope and measurement of digital economy Highlights cutting-edge risk measurement practices regarding cybersecurity risk management Introduces novel concepts, models, and theories, including opportunity value, Digital Valuation Model, six laws of digital theory of value, Cyber Risk Quadrant, and most importantly, cyber risk measures hekla and bitmort Introduces cybernomics, that is, the integration of cyber risk management and economics to study the requirements of a databank in order to improve risk analytics solutions for (1) the valuation of digital assets, (2) the measurement of risk exposure of digital assets, and (3) the capital optimization for managing residual cyber risK Provides a case study on cyber insurance

Managing Cyber Risk

Managing Cyber Risk
Author: Ariel Evans
Publsiher: Routledge
Total Pages: 118
Release: 2019-03-28
ISBN 10: 0429614268
ISBN 13: 9780429614262
Language: EN, FR, DE, ES & NL

Managing Cyber Risk Book Review:

Cyber risk is the second highest perceived business risk according to U.S. risk managers and corporate insurance experts. Digital assets now represent over 85% of an organization’s value. In a survey of Fortune 1000 organizations, 83% surveyed described cyber risk as an organizationally complex topic, with most using only qualitative metrics that provide little, if any insight into an effective cyber strategy. Written by one of the foremost cyber risk experts in the world and with contributions from other senior professionals in the field, Managing Cyber Risk provides corporate cyber stakeholders – managers, executives, and directors – with context and tools to accomplish several strategic objectives. These include enabling managers to understand and have proper governance oversight of this crucial area and ensuring improved cyber resilience. Managing Cyber Risk helps businesses to understand cyber risk quantification in business terms that lead risk owners to determine how much cyber insurance they should buy based on the size and the scope of policy, the cyber budget required, and how to prioritize risk remediation based on reputational, operational, legal, and financial impacts. Directors are held to standards of fiduciary duty, loyalty, and care. These insights provide the ability to demonstrate that directors have appropriately discharged their duties, which often dictates the ability to successfully rebut claims made against such individuals. Cyber is a strategic business issue that requires quantitative metrics to ensure cyber resiliency. This handbook acts as a roadmap for executives to understand how to increase cyber resiliency and is unique since it quantifies exposures at the digital asset level.

Frontiers in Cyber Security

Frontiers in Cyber Security
Author: Guangquan Xu
Publsiher: Springer Nature
Total Pages: 329
Release:
ISBN 10: 9811597391
ISBN 13: 9789811597398
Language: EN, FR, DE, ES & NL

Frontiers in Cyber Security Book Review:

Cybersecurity in the Digital Age

Cybersecurity in the Digital Age
Author: Gregory A. Garrett
Publsiher: Wolters Kluwer Law & Business
Total Pages: 554
Release: 2018-12-17
ISBN 10: 1543812791
ISBN 13: 9781543812794
Language: EN, FR, DE, ES & NL

Cybersecurity in the Digital Age Book Review:

Produced by a team of 14 cybersecurity experts from five countries, Cybersecurity in the Digital Age is ideally structured to help everyone—from the novice to the experienced professional—understand and apply both the strategic concepts as well as the tools, tactics, and techniques of cybersecurity. Among the vital areas covered by this team of highly regarded experts are: Cybersecurity for the C-suite and Board of Directors Cybersecurity risk management framework comparisons Cybersecurity identity and access management – tools & techniques Vulnerability assessment and penetration testing – tools & best practices Monitoring, detection, and response (MDR) – tools & best practices Cybersecurity in the financial services industry Cybersecurity in the healthcare services industry Cybersecurity for public sector and government contractors ISO 27001 certification – lessons learned and best practices With Cybersecurity in the Digital Age, you immediately access the tools and best practices you need to manage: Threat intelligence Cyber vulnerability Penetration testing Risk management Monitoring defense Response strategies And more! Are you prepared to defend against a cyber attack? Based entirely on real-world experience, and intended to empower you with the practical resources you need today, Cybersecurity in the Digital Age delivers: Process diagrams Charts Time-saving tables Relevant figures Lists of key actions and best practices And more! The expert authors of Cybersecurity in the Digital Age have held positions as Chief Information Officer, Chief Information Technology Risk Officer, Chief Information Security Officer, Data Privacy Officer, Chief Compliance Officer, and Chief Operating Officer. Together, they deliver proven practical guidance you can immediately implement at the highest levels.

Roadmap to an Enterprise Security Program

Roadmap to an Enterprise Security Program
Author: Anonim
Publsiher: American Bar Association
Total Pages: 54
Release: 2005
ISBN 10: 9781590315019
ISBN 13: 1590315014
Language: EN, FR, DE, ES & NL

Roadmap to an Enterprise Security Program Book Review:

Principles and Practice of Information Security

Principles and Practice of Information Security
Author: Linda Volonino,Stephen R. Robinson,Charles P. Volonino
Publsiher: Prentice Hall
Total Pages: 232
Release: 2004
ISBN 10:
ISBN 13: UOM:39015057595376
Language: EN, FR, DE, ES & NL

Principles and Practice of Information Security Book Review:

This book provides professionals with the necessary managerial, technical, and legal background to support investment decisions in security technology. It discusses security from the perspective of hackers (i.e., technology issues and defenses) and lawyers (i.e., legal issues and defenses). This cross-disciplinary book is designed to help users quickly become current on what has become a fundamental business issue. This book covers the entire range of best security practices—obtaining senior management commitment, defining information security goals and policies, transforming those goals into a strategy for monitoring intrusions and compliance, and understanding legal implications. Topics also include computer crime, electronic evidence, cyber terrorism, and computer forensics. For professionals in information systems, financial accounting, human resources, health care, legal policy, and law. Because neither technical nor legal expertise is necessary to understand the concepts and issues presented, this book can be required reading for everyone as part of an enterprise-wide computer security awareness program.

Think Like Amazon: 50 1/2 Ideas to Become a Digital Leader

Think Like Amazon: 50 1/2 Ideas to Become a Digital Leader
Author: John Rossman
Publsiher: McGraw Hill Professional
Total Pages: 272
Release: 2019-05-03
ISBN 10: 1260455505
ISBN 13: 9781260455502
Language: EN, FR, DE, ES & NL

Think Like Amazon: 50 1/2 Ideas to Become a Digital Leader Book Review:

The former Amazon executive who launched and scaled Amazon Marketplace delivers the ultimate playbook on how to “think like Amazon” and succeed in the digital age. “What would Jeff do?” Since leaving Amazon to advise start-ups and corporations, John Rossman has been asked this question countless times by executives who want to know “the secret” behind Amazon’s historic success. In this step-by-step guide, he provides 50 1⁄2 answers drawn from his experience as an Amazon executive—and shows today’s business leaders how to think like Amazon, strategize like Bezos, and beat the competition like nobody’s business. Learn how to: •Move forward to get back to Day 1—and change the status quo.•Become a platform company—with the right platform strategy.•Create customer obsession—and grant your customers superpowers.•Experiment, fail, rinse, and repeat.•Decentralize your way to digital greatness.•Master the magic of small autonomous teams.•Avoid the trap of past positions.•Make better and faster decisions.•Use metrics to create a culture of accountability and innovation•Use AI and the Internet of Things to reinvent customer experiences. In addition to these targeted strategies, you’ll receive a rare inside glimpse into how Jeff Bezos and Amazon take a remarkably consistent approach to innovate, explore new markets, and spark new growth. You’ll understand the unique mindset and inner workings that drive Amazon’s operational excellence, from its ground-up approach to new digital markets to its out-of-the-box attitudes on innovation. Along the way, you’ll learn specific game-changing strategies that made Amazon stand out in a crowded digital world. These include actionable ideas that you can use to transform your culture, expand your business into digital, and become the kind of platform company that customers obsess over. Rossman also offers invaluable insights into the latest technologies, e-commerce marketing, online culture, and IoT disruptions that only an Amazon insider would know. If you want to compete and win in the digital era, you have to Think Like Amazon.

The Cyber Risk Handbook

The Cyber Risk Handbook
Author: Domenic Antonucci
Publsiher: John Wiley & Sons
Total Pages: 448
Release: 2017-05
ISBN 10: 1119308801
ISBN 13: 9781119308805
Language: EN, FR, DE, ES & NL

The Cyber Risk Handbook Book Review:

Actionable guidance and expert perspective for real-world cybersecurity The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world situations, and cross-functional solutions for enterprise-wide improvement. Beginning with an overview of counter-cyber evolution, the discussion quickly turns practical with design and implementation guidance for the range of capabilities expected of a robust cyber risk management system that is integrated with the enterprise risk management (ERM) system. Expert contributors from around the globe weigh in on specialized topics with tools and techniques to help any type or size of organization create a robust system tailored to its needs. Chapter summaries of required capabilities are aggregated to provide a new cyber risk maturity model used to benchmark capabilities and to road-map gap-improvement. Cyber risk is a fast-growing enterprise risk, not just an IT risk. Yet seldom is guidance provided as to what this means. This book is the first to tackle in detail those enterprise-wide capabilities expected by Board, CEO and Internal Audit, of the diverse executive management functions that need to team up with the Information Security function in order to provide integrated solutions. Learn how cyber risk management can be integrated to better protect your enterprise Design and benchmark new and improved practical counter-cyber capabilities Examine planning and implementation approaches, models, methods, and more Adopt a new cyber risk maturity model tailored to your enterprise needs The need to manage cyber risk across the enterprise—inclusive of the IT operations—is a growing concern as massive data breaches make the news on an alarmingly frequent basis. With a cyber risk management system now a business-necessary requirement, practitioners need to assess the effectiveness of their current system, and measure its gap-improvement over time in response to a dynamic and fast-moving threat landscape. The Cyber Risk Handbook brings the world's best thinking to bear on aligning that system to the enterprise and vice-a-versa. Every functional head of any organization must have a copy at-hand to understand their role in achieving that alignment.

Measuring and Managing Information Risk

Measuring and Managing Information Risk
Author: Jack Freund,Jack Jones
Publsiher: Butterworth-Heinemann
Total Pages: 408
Release: 2014-08-23
ISBN 10: 0127999329
ISBN 13: 9780127999326
Language: EN, FR, DE, ES & NL

Measuring and Managing Information Risk Book Review:

Using the factor analysis of information risk (FAIR) methodology developed over ten years and adopted by corporations worldwide, Measuring and Managing Information Risk provides a proven and credible framework for understanding, measuring, and analyzing information risk of any size or complexity. Intended for organizations that need to either build a risk management program from the ground up or strengthen an existing one, this book provides a unique and fresh perspective on how to do a basic quantitative risk analysis. Covering such key areas as risk theory, risk calculation, scenario modeling, and communicating risk within the organization, Measuring and Managing Information Risk helps managers make better business decisions by understanding their organizational risk. Uses factor analysis of information risk (FAIR) as a methodology for measuring and managing risk in any organization. Carefully balances theory with practical applicability and relevant stories of successful implementation. Includes examples from a wide variety of businesses and situations presented in an accessible writing style.

How to Measure Anything in Cybersecurity Risk

How to Measure Anything in Cybersecurity Risk
Author: Douglas W. Hubbard,Richard Seiersen
Publsiher: John Wiley & Sons
Total Pages: 304
Release: 2016-07-25
ISBN 10: 1119085292
ISBN 13: 9781119085294
Language: EN, FR, DE, ES & NL

How to Measure Anything in Cybersecurity Risk Book Review:

A ground shaking exposé on the failure of popular cyber risk management methods How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current "risk management" practices, and offers a series of improvement techniques that help you fill the holes and ramp up security. In his bestselling book How to Measure Anything, author Douglas W. Hubbard opened the business world's eyes to the critical need for better measurement. This book expands upon that premise and draws from The Failure of Risk Management to sound the alarm in the cybersecurity realm. Some of the field's premier risk management approaches actually create more risk than they mitigate, and questionable methods have been duplicated across industries and embedded in the products accepted as gospel. This book sheds light on these blatant risks, and provides alternate techniques that can help improve your current situation. You'll also learn which approaches are too risky to save, and are actually more damaging than a total lack of any security. Dangerous risk management methods abound; there is no industry more critically in need of solutions than cybersecurity. This book provides solutions where they exist, and advises when to change tracks entirely. Discover the shortcomings of cybersecurity's "best practices" Learn which risk management approaches actually create risk Improve your current practices with practical alterations Learn which methods are beyond saving, and worse than doing nothing Insightful and enlightening, this book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection, so finding cracks in the vault is a positive thing—as long as you get there before the bad guys do. How to Measure Anything in Cybersecurity Risk is your guide to more robust protection through better quantitative processes, approaches, and techniques.

Enhancing the Role of Insurance in Cyber Risk Management

Enhancing the Role of Insurance in Cyber Risk Management
Author: OECD
Publsiher: OECD Publishing
Total Pages: 140
Release: 2017-12-08
ISBN 10: 9264282149
ISBN 13: 9789264282148
Language: EN, FR, DE, ES & NL

Enhancing the Role of Insurance in Cyber Risk Management Book Review:

This report provides an overview of the financial impact of cyber incidents, the coverage of cyber risk available in the insurance market, the challenges to market development and initiatives to address those challenges.

Guide to Cybersecurity Due Diligence in M&A Transactions

Guide to Cybersecurity Due Diligence in M&A Transactions
Author: Thomas J. Smedinghoff,Roland L. Trope
Publsiher: American Bar Association
Total Pages: 240
Release: 2017
ISBN 10: 9781634258944
ISBN 13: 1634258940
Language: EN, FR, DE, ES & NL

Guide to Cybersecurity Due Diligence in M&A Transactions Book Review:

"In the digital era, ubiquitous connectivity has spared no enterprise the risks of being hacked from anywhere in the world. The reality of this threat, coupled with the near total dependence of today's businesses on networked digital technology, presents a major risk of catastrophic consequences to most businesses. And acquiring or merging with any business involves taking on that risk. Thus, in any M&A transaction, an evaluation of the target's cybersecurity capabilities and experience is critical. [This book] is designed to assist companies and their counsel in assessing that risk. Detailed and easy-to-read, this comprehensive guide includes discussions on recent cyber incidents, including Nieman Marcus, Yahoo, Target Corporation, Sony Pictures, and Volkswagen."--

Cyber-Risk Management

Cyber-Risk Management
Author: Atle Refsdal,Bjørnar Solhaug,Ketil Stølen
Publsiher: Springer
Total Pages: 145
Release: 2015-10-01
ISBN 10: 3319235702
ISBN 13: 9783319235707
Language: EN, FR, DE, ES & NL

Cyber-Risk Management Book Review:

This book provides a brief and general introduction to cybersecurity and cyber-risk assessment. Not limited to a specific approach or technique, its focus is highly pragmatic and is based on established international standards (including ISO 31000) as well as industrial best practices. It explains how cyber-risk assessment should be conducted, which techniques should be used when, what the typical challenges and problems are, and how they should be addressed. The content is divided into three parts. First, part I provides a conceptual introduction to the topic of risk management in general and to cybersecurity and cyber-risk management in particular. Next, part II presents the main stages of cyber-risk assessment from context establishment to risk treatment and acceptance, each illustrated by a running example. Finally, part III details four important challenges and how to reasonably deal with them in practice: risk measurement, risk scales, uncertainty, and low-frequency risks with high consequence. The target audience is mainly practitioners and students who are interested in the fundamentals and basic principles and techniques of security risk assessment, as well as lecturers seeking teaching material. The book provides an overview of the cyber-risk assessment process, the tasks involved, and how to complete them in practice.

Digital Security Risk Management for Economic and Social Prosperity OECD Recommendation and Companion Document

Digital Security Risk Management for Economic and Social Prosperity OECD Recommendation and Companion Document
Author: OECD
Publsiher: OECD Publishing
Total Pages: 72
Release: 2015-10-01
ISBN 10: 9264245472
ISBN 13: 9789264245471
Language: EN, FR, DE, ES & NL

Digital Security Risk Management for Economic and Social Prosperity OECD Recommendation and Companion Document Book Review:

This OECD Recommendation and its Companion Document provide guidance for all stakeholders on the economic and social prosperity dimensions of digital security risk.

The Evidence and Impact of Financial Globalization

The Evidence and Impact of Financial Globalization
Author: Anonim
Publsiher: Academic Press
Total Pages: 800
Release: 2012-12-31
ISBN 10: 012405899X
ISBN 13: 9780124058996
Language: EN, FR, DE, ES & NL

The Evidence and Impact of Financial Globalization Book Review:

The sharp realities of financial globalization become clear during crises, when winners and losers emerge. Crises usher in short- and long-term changes to the status quo, and everyone agrees that learning from crises is a top priority. The Evidence and Impact of Financial Globalization devotes separate articles to specific crises, the conditions that cause them, and the longstanding arrangements devised to address them. While other books and journal articles treat these subjects in isolation, this volume presents a wide-ranging, consistent, yet varied specificity. Substantial, authoritative, and useful, these articles provide material unavailable elsewhere. Substantial articles by top scholars sets this volume apart from other information sources Rapidly developing subjects will interest readers well into the future Reader demand and lack of competitors underline the high value of these reference works

The Privacy Engineer's Manifesto

The Privacy Engineer's Manifesto
Author: Michelle Dennedy,Jonathan Fox,Tom Finneran
Publsiher: Apress
Total Pages: 400
Release: 2014-03-04
ISBN 10: 1430263563
ISBN 13: 9781430263562
Language: EN, FR, DE, ES & NL

The Privacy Engineer's Manifesto Book Review:

"It's our thesis that privacy will be an integral part of the next wave in the technology revolution and that innovators who are emphasizing privacy as an integral part of the product life cycle are on the right track." --The authors of The Privacy Engineer's Manifesto The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value is the first book of its kind, offering industry-proven solutions that go beyond mere theory and adding lucid perspectives on the challenges and opportunities raised with the emerging "personal" information economy. The authors, a uniquely skilled team of longtime industry experts, detail how you can build privacy into products, processes, applications, and systems. The book offers insight on translating the guiding light of OECD Privacy Guidelines, the Fair Information Practice Principles (FIPPs), Generally Accepted Privacy Principles (GAPP) and Privacy by Design (PbD) into concrete concepts that organizations, software/hardware engineers, and system administrators/owners can understand and apply throughout the product or process life cycle—regardless of development methodology—from inception to retirement, including data deletion and destruction. In addition to providing practical methods to applying privacy engineering methodologies, the authors detail how to prepare and organize an enterprise or organization to support and manage products, process, systems, and applications that require personal information. The authors also address how to think about and assign value to the personal information assets being protected. Finally, the team of experts offers thoughts about the information revolution that has only just begun, and how we can live in a world of sensors and trillions of data points without losing our ethics or value(s)...and even have a little fun. The Privacy Engineer's Manifesto is designed to serve multiple stakeholders: Anyone who is involved in designing, developing, deploying and reviewing products, processes, applications, and systems that process personal information, including software/hardware engineers, technical program and product managers, support and sales engineers, system integrators, IT professionals, lawyers, and information privacy and security professionals. This book is a must-read for all practitioners in the personal information economy. Privacy will be an integral part of the next wave in the technology revolution; innovators who emphasize privacy as an integral part of the product life cycle are on the right track. Foreword by Dr. Eric Bonabeau, PhD, Chairman, Icosystem, Inc. & Dean of Computational Sciences, Minerva Schools at KGI.

Cyber Risk, Market Failures, and Financial Stability

Cyber Risk, Market Failures, and Financial Stability
Author: Emanuel Kopp,Lincoln Kaffenberger,Nigel Jenkinson
Publsiher: International Monetary Fund
Total Pages: 36
Release: 2017-08-07
ISBN 10: 1484314131
ISBN 13: 9781484314135
Language: EN, FR, DE, ES & NL

Cyber Risk, Market Failures, and Financial Stability Book Review:

Cyber-attacks on financial institutions and financial market infrastructures are becoming more common and more sophisticated. Risk awareness has been increasing, firms actively manage cyber risk and invest in cybersecurity, and to some extent transfer and pool their risks through cyber liability insurance policies. This paper considers the properties of cyber risk, discusses why the private market can fail to provide the socially optimal level of cybersecurity, and explore how systemic cyber risk interacts with other financial stability risks. Furthermore, this study examines the current regulatory frameworks and supervisory approaches, and identifies information asymmetries and other inefficiencies that hamper the detection and management of systemic cyber risk. The paper concludes discussing policy measures that can increase the resilience of the financial system to systemic cyber risk.

Security Metrics

Security Metrics
Author: Andrew Jaquith
Publsiher: Pearson Education
Total Pages: 336
Release: 2007-03-26
ISBN 10: 9780132715775
ISBN 13: 0132715775
Language: EN, FR, DE, ES & NL

Security Metrics Book Review:

The Definitive Guide to Quantifying, Classifying, and Measuring Enterprise IT Security Operations Security Metrics is the first comprehensive best-practice guide to defining, creating, and utilizing security metrics in the enterprise. Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization’s unique requirements. You’ll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. Security Metrics successfully bridges management’s quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith’s extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. You’ll learn how to: • Replace nonstop crisis response with a systematic approach to security improvement • Understand the differences between “good” and “bad” metrics • Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk • Quantify the effectiveness of security acquisition, implementation, and other program activities • Organize, aggregate, and analyze your data to bring out key insights • Use visualization to understand and communicate security issues more clearly • Capture valuable data from firewalls and antivirus logs, third-party auditor reports, and other resources • Implement balanced scorecards that present compact, holistic views of organizational security effectiveness

Information Security Law

Information Security Law
Author: Mark G. Milone
Publsiher: Law Journal Seminars Press
Total Pages: 1132
Release: 2006
ISBN 10:
ISBN 13: STANFORD:36105064238301
Language: EN, FR, DE, ES & NL

Information Security Law Book Review:

Information Security Law: Control of Digital Assets provides encyclopedic coverage of both the technologies used to protect a network and the laws and policies that bolster them.

Ten Strategies of a World-Class Cybersecurity Operations Center

Ten Strategies of a World-Class Cybersecurity Operations Center
Author: Carson Zimmerman
Publsiher: Anonim
Total Pages: 329
Release: 2014-07-01
ISBN 10: 9780692243107
ISBN 13: 0692243100
Language: EN, FR, DE, ES & NL

Ten Strategies of a World-Class Cybersecurity Operations Center Book Review:

Ten Strategies of a World-Class Cyber Security Operations Center conveys MITRE's accumulated expertise on enterprise-grade computer network defense. It covers ten key qualities of leading Cyber Security Operations Centers (CSOCs), ranging from their structure and organization, to processes that best enable smooth operations, to approaches that extract maximum value from key CSOC technology investments. This book offers perspective and context for key decision points in structuring a CSOC, such as what capabilities to offer, how to architect large-scale data collection and analysis, and how to prepare the CSOC team for agile, threat-based response. If you manage, work in, or are standing up a CSOC, this book is for you. It is also available on MITRE's website, www.mitre.org.