Cyber Intelligence-Driven Risk: How to Build and Use Cyber Intelligence for Business Risk Decisions
Cyber Intelligence-Driven Risk provides a solution to one of the most pressing issues that executives and risk managers face: How can we weave information security into our business decisions to minimize overall business risk?
In today's complex digital landscape, business decisions and cyber event responses have implications for information security that high-level actors may be unable to foresee.
What we need is a cybersecurity command center capable of delivering, not just data, but concise, meaningful interpretations that allow us to make informed decisions.
Building, buying, or outsourcing a CI-DR™ program is the answer. In his work with executives at leading financial organizations and with the U.S. military, author Richard O. Moore III has tested and proven this next-level approach to Intelligence and Risk.
Each function of a well-designed cyber intelligence-driven risk program can support informed business decisions in the era of increased complexity and emergent cyber threats.
This book is a guide to:
CyberSix founder Rich Moore developed a peer reviewed framework called the Cyber Intelligence-Driven Risk (CI-DR™) Framework. He literally wrote the book on CI-DR™. Here are his 5 Cyber Intelligence-Driven Risk Domains.
RICHARD O. MOORE III, MSIA, CISSP, CISM, is founder and CEO of CyberSix, a consultancy that provides executive cyber leadership. Previously, Moore served in top Intelligence and Risk roles at Alvarez and Marsal, New York Life Insurance Company, KPMG, and the Royal Bank of Scotland. He also spent 15 years with the U.S. Marine Corps Intelligence Community.
Our innovative technologies are part of our overall transformational program and technology transfer services. Each technology serves a specific need to reduce risk, provide decision support, and reduce overall costs and resource allocation, thereby reducing cost to operate.
FinTech: Growth and Deregulation
Computer Security Handbook 5th and 6th Editions.
Who are the Bad Guys and What Do They Want?
MSIA: Applied Cryptography; Critical Infrastructure; Network Security; Fundaments of IA