Cyber security: Difference between revisions

From ACT Wiki
Jump to navigationJump to search
(Add link.)
(Expand link title.)
 
(2 intermediate revisions by the same user not shown)
Line 8: Line 8:
*[[Business continuity plan]]
*[[Business continuity plan]]
*[[Business impact analysis]]
*[[Business impact analysis]]
*[[Corporate finance]]
*[[Cyber attack]]
*[[Cyber attack]]
*[[Cyber breach]]
*[[Cyber breach]]
Line 15: Line 16:
*[[Cyber security: protecting your business and your clients]]
*[[Cyber security: protecting your business and your clients]]
*[[Dark web]]
*[[Dark web]]
*[[ICAEW]]
* [[Outside-in cyber review]]
* [[Outside-in cyber review]]




==Other resource==
==Other resources==
*[https://www.treasurers.org/hub/technical/cyber-security-guide-2024 Cyber security in corporate finance - ACT, ICAEW and others]
*[https://www.treasurers.org/hub/treasurer-magazine/why-humans-are-the%E2%80%93weakest-link-in-cybersecurity Why humans are the weakest link in cybersecurity, The Treasurer Web exclusive, 2019]
*[https://www.treasurers.org/hub/treasurer-magazine/why-humans-are-the%E2%80%93weakest-link-in-cybersecurity Why humans are the weakest link in cybersecurity, The Treasurer Web exclusive, 2019]


[[Category:The_business_context]]
[[Category:The_business_context]]

Latest revision as of 21:39, 25 June 2024