Book description
Cyber security is a key issue affecting the confidence of Internet users and the sustainability of businesses. It is also a national issue with regards to economic development and resilience. As a concern, cyber risks are not only in the hands of IT security managers, but of everyone, and non-executive directors and managing directors may be held to account in relation to shareholders, customers, suppliers, employees, banks and public authorities. The implementation of a cybersecurity system, including processes, devices and training, is essential to protect a company against theft of strategic and personal data, sabotage and fraud. Cybersecurity and Decision Makers presents a comprehensive overview of cybercrime and best practice to confidently adapt to the digital world; covering areas such as risk mapping, compliance with the General Data Protection Regulation, cyber culture, ethics and crisis management. It is intended for anyone concerned about the protection of their data, as well as decision makers in any organization.
Table of contents
- Cover
- Foreword
- Preface
- Introduction
- 1 An Increasingly Vulnerable World
- 2 Corporate Governance and Digital Responsibility
-
3 Risk Mapping
- 3.1. Cyber-risks
- 3.2. The context
- 3.3. Vulnerabilities
- 3.4. Legal risks
- 3.5. The objectives of risk mapping
- 3.6. The different methods of risk analysis
- 3.7. Risk assessment (identify)
- 3.8. Protecting
- 3.9. Detecting
- 3.10. Reacting
- 3.11. Restoring
- 3.12. Decentralized mapping
- 3.13. Insurance
- 3.14. Non-compliance risks and ethics
- 4 Regulations
- 5 Best Practices of the Board of Directors
- 6 Resilience and Crisis Management
- Conclusion: The Digital Committee
- Appendices
- Glossary
- References
- Index
- End User License Agreement
Product information
- Title: Cybersecurity and Decision Makers
- Author(s):
- Release date: June 2020
- Publisher(s): Wiley-ISTE
- ISBN: 9781786305190
You might also like
book
Cyber Security, 2nd Edition
Cyber security has never been more essential than it is today, it’s not a case of …
book
PowerShell Cookbook, 4th Edition
How do you use PowerShell to navigate the filesystem, manage files and folders, or retrieve a …
book
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents
Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in …
book
Encryption for Organizations and Individuals: Basics of Contemporary and Quantum Cryptography
Cryptography and encryption aren't just for geeks and spies—they’re also part of our daily lives. This …