Other Sellers on Amazon
+ $3.99 shipping
91% positive over last 12 months
Usually ships within 4 to 5 days.
& FREE Shipping
87% positive over last 12 months
Usually ships within 3 to 4 days.

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required. Learn more
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.


Follow the Authors
OK
Financial Cybersecurity Risk Management: Leadership Perspectives and Guidance for Systems and Institutions 1st ed. Edition
Price | New from | Used from |
- Kindle
$17.53 - $40.50 Read with Our Free App - Paperback
$32.50 - $41.62
Enhance your purchase
Financial cybersecurity is a complex, systemic risk challenge that includes technological and operational elements. The interconnectedness of financial systems and markets creates dynamic, high-risk environments where organizational security is greatly impacted by the level of security effectiveness of partners, counterparties, and other external organizations. The result is a high-risk environment with a growing need for cooperation between enterprises that are otherwise direct competitors. There is a new normal of continuous attack pressures that produce unprecedented enterprise threats that must be met with an array of countermeasures.
Financial Cybersecurity Risk Management explores a range of cybersecurity topics impacting financial enterprises. This includes the threat and vulnerability landscape confronting the financial sector, risk assessment practices and methodologies, and cybersecurity data analytics. Governance perspectives, including executive and board considerations, are analyzed as are the appropriate control measures and executive risk reporting.
What You’ll Learn
- Analyze the threat and vulnerability landscape confronting the financial sector
- Implement effective technology risk assessment practices and methodologies
- Craft strategies to treat observed risks in financial systems
- Improve the effectiveness of enterprise cybersecurity capabilities
- Evaluate critical aspects of cybersecurity governance, including executive and board oversight
- Identify significant cybersecurity operational challenges
- Consider the impact of the cybersecurity mission across the enterprise
- Leverage cybersecurity regulatory and industry standards to help manage financial services risks
- Use cybersecurity scenarios to measure systemic risks in financial systems environments
- Apply key experiences from actual cybersecurity events to develop more robust cybersecurity architectures
Who This Book Is For
Decision makers, cyber leaders, and front-line professionals, including: chief risk officers, operational risk officers, chief information security officers, chief security officers, chief information officers, enterprise risk managers, cybersecurity operations directors, technology and cybersecurity risk analysts, cybersecurity architects and engineers, and compliance officers
- ISBN-101484241932
- ISBN-13978-1484241936
- Edition1st ed.
- Publication dateDecember 14, 2018
- LanguageEnglish
- Dimensions6.1 x 0.64 x 9.25 inches
- Print length280 pages
Frequently bought together
- +
- +
Customers who viewed this item also viewed
Editorial Reviews
From the Back Cover
Financial cybersecurity is a complex, systemic risk challenge that includes technological and operational elements. The interconnectedness of financial systems and markets creates dynamic, high-risk environments where organizational security is greatly impacted by the level of security effectiveness of partners, counterparties, and other external organizations. The result is a high-risk environment with a growing need for cooperation between enterprises that are otherwise direct competitors. There is a new normal of continuous attack pressures that produce unprecedented enterprise threats that must be met with an array of countermeasures.
Financial Cybersecurity Risk Management explores a range of cybersecurity topics impacting financial enterprises. This includes the threat and vulnerability landscape confronting the financial sector, risk assessment practices and methodologies, and cybersecurity data analytics. Governance perspectives, including executive and board considerations, are analyzed as are the appropriate control measures and executive risk reporting.
What You’ll Learn:
- Analyze the threat and vulnerability landscape confronting the financial sector
- Implement effective technology risk assessment practices and methodologies
- Improve the effectiveness of enterprise cybersecurity capabilities
- Evaluate critical aspects of cybersecurity governance, including executive and board oversight
- Identify significant cybersecurity operational challenges
- Consider the impact of the cybersecurity mission across the enterprise
- Leverage cybersecurity regulatory and industry standards to help manage financial services risks
- Use cybersecurity scenarios to measure systemic risks in financial systems environments
- Apply key experiences from actual cybersecurity events to develop more robust cybersecurity architectures
About the Author
Paul Rohmeyer has extensive industry and academic experience in many areas, including: information systems management, IT audit, information security, business continuity planning, and vendor management. He is a faculty member at the School of Business at Stevens Institute of Technology and has presented and published on information security, decision making, and business continuation. He has provided senior-level guidance to numerous financial institutions in the areas of risk management, information assurance, and network security over the past two decades.
Prior to his consulting career, Paul served as Director of IT for AXA Financial and Director of IT Architecture Planning for SAIC/Bellcore. He has MS and PhD degrees in information management from Stevens Institute of Technology, an MBA in finance from St. Joseph’s University, and a BA in economics from Rutgers University. He has achieved the CGEIT (Certified in the Governance of Enterprise IT), PMP (Project Management Professional), and NSA-IAM (US National Security Agency Information Assurance Methodology) credentials.Jennifer L. Bayuk is a cybersecurity due diligence expert, cybersecurity risk management consultant, and an adjunct professor at Stevens Institute of Technology. She has served in many roles, including: global financial services technology risk management officer, Wall Street chief information security officer, Big 4 information risk management consultant, manager of information technology internal audit, security architect, Bell Labs security software engineer, professor of systems security engineering, private cybersecurity investigator, and expert witness.
Jennifer has written numerous publications on information security management, information technology risk management, information security tools and techniques, cybersecurity forensics, technology-related privacy issues, audit of physical and information systems, security awareness education, and systems security metrics. She has master degrees in computer science and philosophy, and a PhD in systems engineering. Her certifications include CISSP, CISA, CISM, CGEIT, and a New Jersey state private investigator license.
Product details
- Publisher : Apress; 1st ed. edition (December 14, 2018)
- Language : English
- Paperback : 280 pages
- ISBN-10 : 1484241932
- ISBN-13 : 978-1484241936
- Item Weight : 14.2 ounces
- Dimensions : 6.1 x 0.64 x 9.25 inches
- Best Sellers Rank: #1,616,326 in Books (See Top 100 in Books)
- #375 in Risk Management (Books)
- #1,335 in Computer Network Security
- #7,335 in Computer Science (Books)
- Customer Reviews:
About the authors
Jennifer L. Bayuk is an information security roadmap consultant engaged in projects ranging from technical architecture requirements to governance strategies. She is also an industry professor at the Stevens Institute of Technology. She has been a Wall Street chief information security officer, a manager of information systems internal audit, a Price Waterhouse security principal consultant and auditor, and a security software engineer at AT&T Bell Laboratories. Bayuk frequently publishes on IT governance, InfoSec, and audit topics, including 5 textbooks and 2 edited compilations on InfoSec Governance Issues. Jennifer has lectured for organizations that include ISACA, NIST, and CSI. Her advanced education includes a Masters in Computer Science and a PhD in Systems Security Engineering. Certifications include CISSP, CISA, CISM, CGEIT, and a NJ State Private Investigator's License. She can be reached at www.bayuk.com.
Paul Rohmeyer has extensive industry and academic experience in many areas, including: information systems management, IT audit, information security, business continuity planning, and vendor management. He is a faculty member at the School of Business at Stevens Institute of Technology and has presented and published on information security, decision making, and business continuation. He has provided senior-level guidance to numerous financial institutions in the areas of risk management, information assurance, and network security over the past two decades.
Prior to academia, Paul served as Director of IT for AXA Financial and Director of IT Architecture Planning for SAIC/Bellcore. He has MS and PhD degrees in information management from Stevens Institute of Technology, an MBA in finance from St. Joseph’s University, and a BA in economics from Rutgers University. He has achieved the CGEIT (Certified in the Governance of Enterprise IT), PMP (Project Management Professional), and NSA-IAM (US National Security Agency Information Assurance Methodology) credentials.
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on Amazon-
Top reviews
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
The book is a clear, minimally-technical exposition about one of the most important challenges facing financial institutions today. The book’s authors, whom I know personally, bring both extensive industry experience and strong academic backgrounds to bear upon a frequently discussed, yet rarely grasped, field. Readers of this book will not only benefit from the knowledge and capabilities that these authors bring to the table, but also acquire a greater awareness of the role of cybersecurity risk management in protecting the financial and other worlds against everyday threats and unexpected catastrophes.
The first four chapters of the book lay out the nature of the cybersecurity risks confronting financial institutions. As the authors put it: “… [the chapters examine] considerations related to noticing, measuring, and estimating cybersecurity risk dimensions …” A section in Chapter 1 on “understanding the adversary” is especially valuable. Few researchers take on this aspect because technologists seldom dig down into why attackers do what they do. Yet this is one of the most important factors affecting cybersecurity risk.
The next three chapters suggest how cybersecurity risk can be mitigated. Chapter 5 recommends means by which management should respond to recognized risks. The book then goes on to address issues introduced by the dynamics of the risk environment. This is important because it is common for cybersecurity professionals to drive their security programs by looking into their rearview mirrors rather than concentrating on the road ahead.
The final three chapters suggest how we might learn from experience, improve our capabilities, and plan for a very dynamic future. This section contains some sobering admonitions such as: “… the field is full of products that appear to be random tinkering of questionable value for the purpose of cybersecurity risk reduction.” Also, there is claim that “… the growing volume of threatening statistics … are very often made by cybersecurity industry participants who will undoubtedly profit from increase in cybersecurity spending.” Readers would do well to heed these warnings and the many others described in the book as they tread through the cyber minefield that confronts us all.
While the book is clearly aimed at cybersecurity, risk and auditing professionals, its appeal extends to policy makers, legislators, regulators and enforcement agencies. The authors’ nontechnical but informative style makes for easy reading and ready comprehension by those not fully versed in information technology, but who are responsible for making influential managerial decisions relating to cybersecurity risks. At the same time, the book provides seasoned professionals with many new insights into the murky field of cybersecurity risk management and exposes many critical issues that needed to be clarified.
Note: This review is based on a prepublication copy of the book.
One should first consider the obvious in pretty much every endeavor. When it comes to information security for financial services firms, it is eminently clear that it’s an area that must be of extreme importance. In Financial Cybersecurity Risk Management: Leadership Perspectives and Guidance for Systems and Institutions, authors Paul Rohmeyer and Jennifer Bayuk take their extensive experience in the financial services sector and have written a pragmatic and actionable guide to make sure that information security gets done.
When it comes to financial services security, the major players (Morgan Stanley, Chase, Citi, Goldman Sachs, et al) have world-class information security program. But for every Morgan Stanley, there 100 smaller banks and credit unions that struggle to keep up with information security. This is a book that is of value though, to all of the aforementioned organizations.
Far too many books focus on hardware and tools. Rohmeyer and Bayuk don’t fall into that trap, and instead focusing on understanding and mitigating risk. They detail topics such as scenario analysis, which makes an organization focus on various scenarios that they’ll fact in the real world. All the security hardware and software won’t amount to much if a firm does not understand in what specific scenarios, they are expected to protect the organization.
Topics such as information risk and operational risk play a large part in the book. Only by understanding these areas can a firm even get close to truly dealing with information security, regulation, risk and more.
Towards the end of the book, the authors exhort the reader to get real about planning for information security and risk. They note that security is not a domain that tolerates theoretical attribution based on project plans. Rather enterprise capabilities are only relevant when applied to real-world conditions.
The book shows the reader those real-world conditions, and how to effectively deal with security and risk. This is a serious book meant for a serious reader. There are no simple answers to the complex arena of financial services security and risk. For the reader looking to get equally serious about dealing with it, Financial Cybersecurity Risk Management is a worthwhile and tactical guide that can certainly help them on their journey.
1. The use of actual attack scenarios to carry out threat modeling exercises. Too often they are driven with generic threats.
2. Connecting Geoffrey Moore's "Crossing the Chasm" with cybersecurity. Product adoption cycles are not linear; if security isn't built in, it may never be included as adoption surges.
3. The authors highlight scenario planning as an important part of risk management. Common in business circles, but not in cybersecurity.
4. The two most informative sentences for me in the book were: "...the only way to maintain low odds of successful cybersecurity attack is for the system itself to evolve with each new threat and attack pattern." How to do this is the challenge. The second sentence is: "To really reduce the odds of cyber attack using detective measures, control engineers and operators must willingly suspend their beliefs that the existing controls actually work." Information security is one of the only fields where we buy technology without really testing it.
In summary, I recommend picking up this book; you will find gold nuggets that you can use in your organization.