Realise the benefits of Internet technologies, while ensuring your company is protected from the associated risks!
An effective risk management strategy is vital to your company's survival
Internet technologies have revolutionised the way that business is conducted. However, these innovations expose your business to various risks. Inadequate security can lead to the theft of customer data and, in the event of technological failure or a cyberattack, your business could lose its ability to function altogether. An effective risk management strategy is, therefore, vital to your company's survival.
Understand the origins of cyber risks and develop suitable strategies for their management
Cyber Risks for Business Professionals: A Management Guide is a general guide to the origins of cyber risks and to developing suitable strategies for their management. It provides a breakdown of the main risks involved and shows you how to manage them. Covering the relevant legislation on information security and data protection, the author combines his legal expertise with a solid, practical grasp of the latest developments in IT to offer a comprehensive overview of a highly complex subject.
Expert guidance examining the operational and technological risks
Drawing on interviews with experts from Clifford Chance, Capgemini and Morgan Stanley amongst others, the book examines the operational and technological risks alongside the legal and compliance issues. This book will be invaluable to lawyers and accountants, as well as to company directors and business professionals.
Benefits to business include:
Understand and manage the technological risks This book looks at the security issues surrounding Cloud computing, and highlights the problems that have arisen as a result of the use of laptop computers and memory sticks for remote working. Implementing a risk management framework will offer reassurance to your existing customers and improve your chances of winning new business.
Familiarise yourself with the legal issues You need to be aware of the laws that govern your activities when you do business online. The author offers you a guide to the most important aspects of IT law, and outlines the implications of recent legislation. The author also looks at the compliance requirements of PCI DSS (the Payment Card Industry Data Security Standard).
Control employee use of Web 2.0 technologies While sites such as Facebook and LinkedIn help people to develop business contacts, employee misuse of social networking sites also causes problems, ranging from damage to the company's reputation to breaches of commercial confidentiality. This book offers advice on the right policy to adopt to ensure your staff use Web 2.0 technologies responsibly.
Use technology to address the risks This book introduces you to IT solutions that you can deploy to improve your information security, such as encryption and digital watermarking. It also looks at how you can monitor and control e-mail to prevent the leaking of sensitive information.
Table of contents
- Title Page
- Copyright Page
- About the Author
Part 1 – Identifying Cyber Risks
- Chapter 1: Setting the Scene
- Chapter 2: Technology Risks
- Chapter 3: Legal Compliance Risks
- Chapter 4: Operational Risks
Part 2 – Risk Management Strategies
- Chapter 5: The Need for Governance
- Chapter 6: Assessing Risk
- Chapter 7: Risk Management Strategies
Part 3 – Cyber Risk Solutions
- Chapter 8: Technology Solutions
- Chapter 9: Compliance Solutions
- Chapter 10: Operational Solutions
- Chapter 11: The Cybersecure Entity
- ITG Resources
- Title: Cyber Risks for Business Professionals
- Release date: October 2010
- Publisher(s): IT Governance Publishing
- ISBN: 9781849281430
You might also like
Cybersecurity Blue Team Toolkit
A practical handbook to cybersecurity for both tech and non-tech professionals As reports of major data …
The Official (ISC)2 Guide to the CISSP CBK Reference, 5th Edition
The only official, comprehensive reference guide to the CISSP All new for 2019 and beyond, this …
Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks
Conquering cyber attacks requires a multi-sector, multi-modal approach Cyber Threat! How to Manage the Growing Risk …
The Time Cleanse: A Proven System to Eliminate Wasted Time, Realize Your Full Potential, and Reinvest in What Matters Most
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, …