Cybersecurity Threats to the Critical Infrastructure
Brian Lozada
Introduction: The Next Frontier of Risk Management: Cyber Risk
A Proposed Business-Oriented Approach to Cyber
A Practical Approach to Developing a Cybersecurity Programme
Regulations, Compliance and Cyber Risk Management
The Role of Cyber Risk in the Organisation
The Evolution of the Cyber Risk Role within the Three Lines of Defence
Quantifying Cyber Risk
Leadership and Culture: The Foundations of Cyber-Risk Management
Understanding the Cyber Risk Landscape: An Integrated Framework
The Transformation of Information Security: New Threats and Vulnerabilities
Cybersecurity Metrics: The Good, the Bad and the Ugly
Third-Party Risk Management
Cybersecurity’s Neighbourhood Watch: The Strength of Information Sharing
Cyber Risks in Business Continuity Management and Supply Chain Resilience for Financial Institutions
Cybersecurity Threats to the Critical Infrastructure
The True Meaning of Cyber Incident Response
Cyber Risk: Where We Have Been, Where We Are and Where We Are Going
This chapter focuses on the cyber terrorism and highlights the impact and effects of present and future attacks by international cyber-terrorist organisations on the critical infrastructure of the US and other countries globally.
The threat of cyber attacks has a scope much broader than the civilian and corporate realms: in recent years, as more critical national infrastructures are becoming computerised, the fear of cyber attacks on government agencies and organisations has become a risk to the nation’s security. With new technological advances every day, the cyber sphere has become a new opportunity for cyber warfare, which will only increase and become more sophisticated in the wake of the ever-changing threat landscape. With the cyber sphere emerging as a new battleground for warfare, attacks will be more sophisticated and have the potential to have devastating impacts, shutting down power grids, telecommunication lines, transportation, commerce and every action of daily life. The recovery efforts of a major cyber warfare attack would be significantly greater, given that most companies and infrastructures are not prepared and have not invested in cyber incident response and
Copyright Infopro Digital Limited. All rights reserved.
You may share this content using our article tools. Printing this content is for the sole use of the Authorised User (named subscriber), as outlined in our terms and conditions - https://www.infopro-insight.com/terms-conditions/insight-subscriptions/
If you would like to purchase additional rights please email info@risk.net
Copyright Infopro Digital Limited. All rights reserved.
You may share this content using our article tools. Copying this content is for the sole use of the Authorised User (named subscriber), as outlined in our terms and conditions - https://www.infopro-insight.com/terms-conditions/insight-subscriptions/
If you would like to purchase additional rights please email info@risk.net