The store will not work correctly in the case when cookies are disabled.
Cookies help us deliver our services. By using our services, you agree to our use of cookies.Learn more
This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Essential
Name
Description
Lifetime
CUSTOMER_SEGMENT_IDS
Stores your Customer Segment ID
1 Year
EXTERNAL_NO_CACHE
A flag that, indicates whether caching is on or off.
1 Year
FRONTEND
Your session ID on the server.
1 Year
GUEST-VIEW
Allows guests to edit their orders.
1 Year
LAST_CATEGORY
The last category you visited.
1 Year
LAST_PRODUCT
The last product you looked at.
1 Year
NEWMESSAGE
Indicates whether a new message has been received.
1 Year
NO_CACHE
Indicates whether it is allowed to use cache.
1 Year
PERSISTENT_SHOPPING_CART
A link to information about your cart and viewing history if you have asked the site.
This, the third White Paper in the Calculating Reserves for Cyber Risk series, provides some insight into the significance and implications of using calibrated estimating techniques to specify the minimum and maximum range of a distribution and the choice of the distribution itself and shows how to extend a calibrated estimate to infer the tail ofa bounded distribution and how to apply calibrated estimation to unbounded distributions. Through these techniques, a calibrated estimate combined with a distribution can be used to make meaningful VaR and CVaR calculations.Learn More
This white paper is the second in the series of Calculating Network Risk Reserves, which introduces how to quantify and review network risk models.Model review requires transparency, relevance and rationality of the model. This document outlines how the Chief Risk Officer (CRO), Chief Information Officer (CIO) and Chief Information Security Officer (CISO) jointly meet these model review requirements.Learn More
This, the second White Paper in the Calculating Reserves for Cyber Risk series, demonstrates how cyber risk models can be quantified and vetted. Model vetting requires that models are made transparent, relevant, and parsimonious, and this document outlines how Chief Risk Officers (CROs), Chief Information Officers (CIOs), and Chief Information Security Officers (CISOs) can work together to meet these model vetting requirements.Learn More
This White Paper, developed by a joint project of The Open Group ArchiMate® Forum and The Open Group Security Forum, summarizes the ArchiMate 3.1 language.Learn More
This document demonstrates to Chief Information Officers (CIOs), Chief Information Security Officers (CISOs), Chief Risk Officers (CROs), and cyber risk analysts in Financial Institutions how cyber risk can be quantified in economic terms as well as calculate reserve requirements.Learn More
The purpose of this document is to show the Chief Information Officer (CIO), Chief Information Security Officer (CISO), Chief Risk Officer (CRO) and network risk analysts of financial institutions how to quantify network risk from an economic perspective and calculate reserve requirements.Learn More
This document introduces Zero Trust to leaders in Business, Security, and IT. It provides a foundation on the drivers for Zero Trust, their implications, and the role of Zero Trust.Learn More
This White Paper, developed by a joint project of The Open Group ArchiMate® Forum and The Open Group Security Forum, summarizes the ArchiMate 3.1 language.Learn More
This document introduces Zero Trust to leaders in Business, Security, and IT. It provides a foundation on the drivers for Zero Trust, their implications, and the role of Zero Trust.Learn More