These are the sources and citations used to research Cyber Risk. This bibliography was generated on Cite This For Me on
In-text: (Boehm et al., 2019)
Your Bibliography: Boehm, J., Curcio, N., Merrath, P., Shenton, L. and Stahle, T., 2019. The risk based approach to cybersecurity. [online] mcKinsey.com. Available at: <https://www.mckinsey.com/business-functions/risk-and-resilience/our-insights/the-risk-based-approach-to-cybersecurity> [Accessed 29 May 2022].
In-text: (Continuity Central, 2021)
Your Bibliography: Continuitycentral.com. 2021. Continuity Central. [online] Available at: <https://www.continuitycentral.com/index.php/news/technology/6110-world-economic-forum-publishes-six-principles-for-board-governance-of-cyber-risk> [Accessed 29 May 2022].
In-text: (COSO’s Enterprise Risk Management – Integrated Framework | ERM - Enterprise Risk Management Initiative | NC State Poole College of Management, 2004)
Your Bibliography: Erm.ncsu.edu. 2004. COSO’s Enterprise Risk Management – Integrated Framework | ERM - Enterprise Risk Management Initiative | NC State Poole College of Management. [online] Available at: <https://erm.ncsu.edu/library/article/coso-erm-framework#:~:text=%E2%80%9CERM%20is%20a%20process%2C%20affected,provide%20reasonable%20assurance%20regarding%20the> [Accessed 29 May 2022].
In-text: (Fachetti, 2018)
Your Bibliography: Fachetti, D., 2018. The Board’s Role in Cyber Risk Management: Advice from Top Directors. [online] Bitsight.com. Available at: <https://www.bitsight.com/blog/the-boards-role-in-cyber-risk-management> [Accessed 29 May 2022].
In-text: (Giles, 2016)
Your Bibliography: Giles, J., 2016. King IV Code and IT Governance. [online] Michalsons. Available at: <https://www.michalsons.com/blog/king-iv-code-and-it-governance/18691> [Accessed 29 May 2022].
In-text: (Goh et al., 2020)
Your Bibliography: Goh, J., Kang, H., Koh, Z., Lim, J., Ng, C., Sher, G., Yao, C., Čihák, M. and Allmen, U., 2020. Cyber Risk Surveillance: A Case Study of Singapore. [online] imfsg. Available at: <https://www.elibrary.imf.org/view/journals/001/2020/028/article-A001-en.xml> [Accessed 29 May 2022].
In-text: (Joyce, Dobrygowski and Van Oord, 2021)
Your Bibliography: Joyce, S., Dobrygowski, D. and Van Oord, F., 2021. Principles for Board Governance of Cyber Risk. [online] The Harvard Law School Forum on Corporate Governance. Available at: <https://corpgov.law.harvard.edu/2021/06/10/principles-for-board-governance-of-cyber-risk/> [Accessed 29 May 2022].
In-text: (Newsome, 2019)
Your Bibliography: Newsome, T., 2019. The 2013 Target Data Breach & Third-Party Risk Management | Prevalent. [online] Prevalent. Available at: <https://www.prevalent.net/blog/the-2013-target-data-breach-a-lasting-lesson-in-third-party-risk-management/> [Accessed 29 May 2022].
In-text: (Pearson, 2021)
Your Bibliography: Pearson, D., 2021. What is a KPI? | A complete guide to Key Performance Indicators. [online] Geckoboard blog. Available at: <https://www.geckoboard.com/blog/what-is-a-key-performance-indicator-kpi/> [Accessed 29 May 2022].
In-text: (Pizzala, 2017)
Your Bibliography: Pizzala, J., 2017. An integrated vision to manage cyber risk-Why cybersecurity is everyone responsibility in todays financial services organization. [online] Assets.ey.com. Available at: <https://assets.ey.com/content/dam/ey-sites/ey-com/en_gl/topics/digital/ey-an-integrated-vision-to-manage-cyber-risk.pdf> [Accessed 29 May 2022].
In-text: (Ten Common Risk Management Failures and How to Avoid Them | Protiviti - United States, n.d.)
Your Bibliography: Protiviti.com. n.d. Ten Common Risk Management Failures and How to Avoid Them | Protiviti - United States. [online] Available at: <https://www.protiviti.com/US-en/insights/bulletinv3-i6> [Accessed 29 May 2022].
In-text: (Samuels, 2020)
Your Bibliography: Samuels, M., 2020. What is a CISO? Everything you need to know about the Chief Information Security Officer role. [online] ZDNet. Available at: <https://www.zdnet.com/article/what-is-a-ciso-everything-you-need-to-know-about-the-chief-information-security-officer/> [Accessed 29 May 2022].
In-text: (What Executives Get Wrong About Cybersecurity & Risk Management, 2020)
Your Bibliography: SecurityScorecard. 2020. What Executives Get Wrong About Cybersecurity & Risk Management. [online] Available at: <https://securityscorecard.com/blog/what-executives-get-wrong-about-cybersecurity-risk-management> [Accessed 29 May 2022].
In-text: (Till, 2021)
Your Bibliography: Till, S., 2021. The Convergence of the Physical and Digital Security Worlds. [online] Securityinfowatch.com. Available at: <https://www.securityinfowatch.com/access-identity/article/21227403/the-convergence-of-the-physical-and-digital-security-worlds> [Accessed 29 May 2022].
In-text: (Tunggal, 2022)
Your Bibliography: Tunggal, A., 2022. 14 Cybersecurity Metrics + KPIs You Must Track in 2022 | UpGuard. [online] Upguard.com. Available at: <https://www.upguard.com/blog/cybersecurity-metrics> [Accessed 29 May 2022].
In-text: (Valsamakis, Du Toit and Vivian, 2005)
Your Bibliography: Valsamakis, A., Du Toit, G. and Vivian, R., 2005. Risk management. 3rd ed. Sandton: Heinemann, p.80.
10,587 students joined last month!