Cyber security: Difference between revisions

From ACT Wiki
Jump to navigationJump to search
imported>Doug Williamson
(Link with Cyber breach page.)
(Add links.)
 
(8 intermediate revisions by 2 users not shown)
Line 8: Line 8:
*[[Business continuity plan]]
*[[Business continuity plan]]
*[[Business impact analysis]]
*[[Business impact analysis]]
*[[Corporate finance]]
*[[Cyber attack]]
*[[Cyber attack]]
*[[Cyber breach]]
*[[Cyber breach]]
Line 14: Line 15:
*[[Cybercrime – A Threat And An Opportunity]]
*[[Cybercrime – A Threat And An Opportunity]]
*[[Cyber security: protecting your business and your clients]]
*[[Cyber security: protecting your business and your clients]]
*[[Dark web]]
*[[Encryption]]
*[[Homomorphic encryption]]
*[[ICAEW]]
* [[Outside-in cyber review]]
==Other resources==
*[https://www.treasurers.org/hub/technical/cyber-security-guide-2024 Cyber security in corporate finance - ACT, ICAEW and others]
*[https://www.treasurers.org/hub/treasurer-magazine/why-humans-are-the%E2%80%93weakest-link-in-cybersecurity Why humans are the weakest link in cybersecurity, The Treasurer Web exclusive, 2019]
[[Category:The_business_context]]

Latest revision as of 05:18, 6 September 2024