Siegel, S. A., & Sweeney. M. (2020). Cyber strategy: Risk-driven security and resiliency. Auerbach Publications. This ebook discusses all the steps required from conception of the plan from preplanning, project management directives, cyber threat and vulnerability analysis, cyber risk and controls assessment to reporting and measurement techniques for plan success and overall strategic plan performance. Read Chapter 3, pages 57-73.
Cox, S. M., Brooks, B. W., & Chanland, D. E. (2018). I think you need another account: The case of Wells Fargo. Journal of Critical Incidents, 11, 325–339. The case study discusses the 2016 data breach at Wells Fargo.
Parent, D. (2019). Combatting financial fraud and identity theft in a digital world. Credit Union Times, 30(10), 1–3. The article discusses financial fraud and theft in a digital world in credit unions.
Singh, S., & Kumar, S. (2020). The times of cyber attacks. Acta Technica Corvininesis - Bulletin of Engineering, 13(3), 133–137. This article discusses generations of cyber attacks, attacker strategies, and some of the world's most significant cyberattacks. The statistical data of cyber attacks and security are discussed.