These are the sources and citations used to research Cyber Risk. This bibliography was generated on Cite This For Me on

  • Website

    Boehm, J., Curcio, N., Merrath, P., Shenton, L. and Stahle, T.

    The risk based approach to cybersecurity

    2019 - McKinsey and Company

    In-text: (Boehm et al., 2019)

    Your Bibliography: Boehm, J., Curcio, N., Merrath, P., Shenton, L. and Stahle, T., 2019. The risk based approach to cybersecurity. [online] mcKinsey.com. Available at: <https://www.mckinsey.com/business-functions/risk-and-resilience/our-insights/the-risk-based-approach-to-cybersecurity> [Accessed 29 May 2022].

  • Website

    Continuity Central

    2021

    In-text: (Continuity Central, 2021)

    Your Bibliography: Continuitycentral.com. 2021. Continuity Central. [online] Available at: <https://www.continuitycentral.com/index.php/news/technology/6110-world-economic-forum-publishes-six-principles-for-board-governance-of-cyber-risk> [Accessed 29 May 2022].

  • Website

    COSO’s Enterprise Risk Management – Integrated Framework | ERM - Enterprise Risk Management Initiative | NC State Poole College of Management

    2004

    In-text: (COSO’s Enterprise Risk Management – Integrated Framework | ERM - Enterprise Risk Management Initiative | NC State Poole College of Management, 2004)

    Your Bibliography: Erm.ncsu.edu. 2004. COSO’s Enterprise Risk Management – Integrated Framework | ERM - Enterprise Risk Management Initiative | NC State Poole College of Management. [online] Available at: <https://erm.ncsu.edu/library/article/coso-erm-framework#:~:text=%E2%80%9CERM%20is%20a%20process%2C%20affected,provide%20reasonable%20assurance%20regarding%20the> [Accessed 29 May 2022].

  • Website

    Fachetti, D.

    The Board’s Role in Cyber Risk Management: Advice from Top Directors

    2018 - BITSight

    In-text: (Fachetti, 2018)

    Your Bibliography: Fachetti, D., 2018. The Board’s Role in Cyber Risk Management: Advice from Top Directors. [online] Bitsight.com. Available at: <https://www.bitsight.com/blog/the-boards-role-in-cyber-risk-management> [Accessed 29 May 2022].

  • Website

    Giles, J.

    King IV Code and IT Governance

    2016 - Michelson's

    In-text: (Giles, 2016)

    Your Bibliography: Giles, J., 2016. King IV Code and IT Governance. [online] Michalsons. Available at: <https://www.michalsons.com/blog/king-iv-code-and-it-governance/18691> [Accessed 29 May 2022].

  • Website

    Goh, J., Kang, H., Koh, Z., Lim, J., Ng, C., Sher, G., Yao, C., Čihák, M. and Allmen, U.

    Cyber Risk Surveillance: A Case Study of Singapore

    2020 - IMGSG

    In-text: (Goh et al., 2020)

    Your Bibliography: Goh, J., Kang, H., Koh, Z., Lim, J., Ng, C., Sher, G., Yao, C., Čihák, M. and Allmen, U., 2020. Cyber Risk Surveillance: A Case Study of Singapore. [online] imfsg. Available at: <https://www.elibrary.imf.org/view/journals/001/2020/028/article-A001-en.xml> [Accessed 29 May 2022].

  • Website

    Joyce, S., Dobrygowski, D. and Van Oord, F.

    Principles for Board Governance of Cyber Risk

    2021 - Harvard

    In-text: (Joyce, Dobrygowski and Van Oord, 2021)

    Your Bibliography: Joyce, S., Dobrygowski, D. and Van Oord, F., 2021. Principles for Board Governance of Cyber Risk. [online] The Harvard Law School Forum on Corporate Governance. Available at: <https://corpgov.law.harvard.edu/2021/06/10/principles-for-board-governance-of-cyber-risk/> [Accessed 29 May 2022].

  • Website

    Newsome, T.

    The 2013 Target Data Breach & Third-Party Risk Management | Prevalent

    2019 - Prevalent

    In-text: (Newsome, 2019)

    Your Bibliography: Newsome, T., 2019. The 2013 Target Data Breach & Third-Party Risk Management | Prevalent. [online] Prevalent. Available at: <https://www.prevalent.net/blog/the-2013-target-data-breach-a-lasting-lesson-in-third-party-risk-management/> [Accessed 29 May 2022].

  • Website

    Pearson, D.

    What is a KPI? | A complete guide to Key Performance Indicators

    2021 - Geckoboard

    In-text: (Pearson, 2021)

    Your Bibliography: Pearson, D., 2021. What is a KPI? | A complete guide to Key Performance Indicators. [online] Geckoboard blog. Available at: <https://www.geckoboard.com/blog/what-is-a-key-performance-indicator-kpi/> [Accessed 29 May 2022].

  • Website

    Pizzala, J.

    An integrated vision to manage cyber risk-Why cybersecurity is everyone responsibility in todays financial services organization

    2017 - Ernest and Young

    In-text: (Pizzala, 2017)

    Your Bibliography: Pizzala, J., 2017. An integrated vision to manage cyber risk-Why cybersecurity is everyone responsibility in todays financial services organization. [online] Assets.ey.com. Available at: <https://assets.ey.com/content/dam/ey-sites/ey-com/en_gl/topics/digital/ey-an-integrated-vision-to-manage-cyber-risk.pdf> [Accessed 29 May 2022].

  • Website

    Ten Common Risk Management Failures and How to Avoid Them | Protiviti - United States

    Protiviti

    In-text: (Ten Common Risk Management Failures and How to Avoid Them | Protiviti - United States, n.d.)

    Your Bibliography: Protiviti.com. n.d. Ten Common Risk Management Failures and How to Avoid Them | Protiviti - United States. [online] Available at: <https://www.protiviti.com/US-en/insights/bulletinv3-i6> [Accessed 29 May 2022].

  • Website

    Samuels, M.

    What is a CISO? Everything you need to know about the Chief Information Security Officer role

    2020 - ZDnet

    In-text: (Samuels, 2020)

    Your Bibliography: Samuels, M., 2020. What is a CISO? Everything you need to know about the Chief Information Security Officer role. [online] ZDNet. Available at: <https://www.zdnet.com/article/what-is-a-ciso-everything-you-need-to-know-about-the-chief-information-security-officer/> [Accessed 29 May 2022].

  • Website

    What Executives Get Wrong About Cybersecurity & Risk Management

    2020 - Security Scorecard

    In-text: (What Executives Get Wrong About Cybersecurity & Risk Management, 2020)

    Your Bibliography: SecurityScorecard. 2020. What Executives Get Wrong About Cybersecurity & Risk Management. [online] Available at: <https://securityscorecard.com/blog/what-executives-get-wrong-about-cybersecurity-risk-management> [Accessed 29 May 2022].

  • Website

    Till, S.

    The Convergence of the Physical and Digital Security Worlds

    2021 - Security Info Watch

    In-text: (Till, 2021)

    Your Bibliography: Till, S., 2021. The Convergence of the Physical and Digital Security Worlds. [online] Securityinfowatch.com. Available at: <https://www.securityinfowatch.com/access-identity/article/21227403/the-convergence-of-the-physical-and-digital-security-worlds> [Accessed 29 May 2022].

  • Website

    Tunggal, A. T.

    14 Cybersecurity Metrics + KPIs You Must Track in 2022 | UpGuard

    2022 - Upguard

    In-text: (Tunggal, 2022)

    Your Bibliography: Tunggal, A., 2022. 14 Cybersecurity Metrics + KPIs You Must Track in 2022 | UpGuard. [online] Upguard.com. Available at: <https://www.upguard.com/blog/cybersecurity-metrics> [Accessed 29 May 2022].

  • Book

    Valsamakis, A. C., Du Toit, G. S. and Vivian, R. W.

    Risk management

    2005 - Heinemann - Sandton

    In-text: (Valsamakis, Du Toit and Vivian, 2005)

    Your Bibliography: Valsamakis, A., Du Toit, G. and Vivian, R., 2005. Risk management. 3rd ed. Sandton: Heinemann, p.80.

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Quick and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use plagiarism checker
  • ✔ Create and edit multiple bibliographies
Join