{"title":"结论","authors":"Gregory Falco, Eric Rosenbach","doi":"10.1093/oso/9780197526545.003.0009","DOIUrl":null,"url":null,"abstract":"The conclusion summarizes the importance of an Embedded Endurance cyber risk strategy and the steps you can take to design and implement your own. The Embedded Endurance cyber risk strategy you will build focuses on implementing mitigation measures that include prevention and resilience. The chapter describes how even in an evolving cyber risk landscape, the concepts described in the Embedded Endurance cyber risk strategy will remain foundational. The chapter concludes with “cryptograms” from the future, in which organizational leaders confront the next generation of cyber risk challenges. The cryptograms encourage readers to apply the lessons learned and extend these Embedded Endurance strategy lessons to the future.","PeriodicalId":176943,"journal":{"name":"Confronting Cyber Risk","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Conclusion\",\"authors\":\"Gregory Falco, Eric Rosenbach\",\"doi\":\"10.1093/oso/9780197526545.003.0009\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The conclusion summarizes the importance of an Embedded Endurance cyber risk strategy and the steps you can take to design and implement your own. The Embedded Endurance cyber risk strategy you will build focuses on implementing mitigation measures that include prevention and resilience. The chapter describes how even in an evolving cyber risk landscape, the concepts described in the Embedded Endurance cyber risk strategy will remain foundational. The chapter concludes with “cryptograms” from the future, in which organizational leaders confront the next generation of cyber risk challenges. The cryptograms encourage readers to apply the lessons learned and extend these Embedded Endurance strategy lessons to the future.\",\"PeriodicalId\":176943,\"journal\":{\"name\":\"Confronting Cyber Risk\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-11-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Confronting Cyber Risk\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1093/oso/9780197526545.003.0009\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Confronting Cyber Risk","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1093/oso/9780197526545.003.0009","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The conclusion summarizes the importance of an Embedded Endurance cyber risk strategy and the steps you can take to design and implement your own. The Embedded Endurance cyber risk strategy you will build focuses on implementing mitigation measures that include prevention and resilience. The chapter describes how even in an evolving cyber risk landscape, the concepts described in the Embedded Endurance cyber risk strategy will remain foundational. The chapter concludes with “cryptograms” from the future, in which organizational leaders confront the next generation of cyber risk challenges. The cryptograms encourage readers to apply the lessons learned and extend these Embedded Endurance strategy lessons to the future.