Cyber security: Difference between revisions

From ACT Wiki
Jump to navigationJump to search
imported>Doug Williamson
(Add link to web exclusive.)
(Add links.)
 
(6 intermediate revisions by the same user not shown)
Line 8: Line 8:
*[[Business continuity plan]]
*[[Business continuity plan]]
*[[Business impact analysis]]
*[[Business impact analysis]]
*[[Corporate finance]]
*[[Cyber attack]]
*[[Cyber attack]]
*[[Cyber breach]]
*[[Cyber breach]]
Line 14: Line 15:
*[[Cybercrime – A Threat And An Opportunity]]
*[[Cybercrime – A Threat And An Opportunity]]
*[[Cyber security: protecting your business and your clients]]
*[[Cyber security: protecting your business and your clients]]
*[[Dark web]]
*[[Encryption]]
*[[Homomorphic encryption]]
*[[ICAEW]]
* [[Outside-in cyber review]]




==Other links==
==Other resources==
[https://www.treasurers.org/hub/treasurer-magazine/why-humans-are-the%E2%80%93weakest-link-in-cybersecurity Why humans are the weakest link in cybersecurity, The Treasurer Web exclusive, 2019]
*[https://www.treasurers.org/hub/technical/cyber-security-guide-2024 Cyber security in corporate finance - ACT, ICAEW and others]
*[https://www.treasurers.org/hub/treasurer-magazine/why-humans-are-the%E2%80%93weakest-link-in-cybersecurity Why humans are the weakest link in cybersecurity, The Treasurer Web exclusive, 2019]


[[Category:Financial_risk_management]]
[[Category:The_business_context]]
[[Category:Technology]]

Latest revision as of 05:18, 6 September 2024