Book description
Practical guide that can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business
Emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues
Covers 'What to Do When You Get Hacked?' including Business Continuity and Disaster Recovery planning, Public Relations, Legal and Regulatory issues, and Notifications and Disclosures
Provides steps for integrating cybersecurity into Strategy; Policy and Guidelines; Change Management and Personnel Management
Identifies cybersecurity best practices that executives can and should use both in the office and at home to protect their vital information
Table of contents
- COVER
- TITLE PAGE
- COPYRIGHT PAGE
- DEDICATION PAGE
- FOREWORD
- PREFACE
- ACKNOWLEDGMENTS
- 1.0 INTRODUCTION
- 2.0 WHY BE CONCERNED?
- 3.0 MANAGING RISK
- 4.0 BUILD YOUR STRATEGY
- 5.0 PLAN FOR SUCCESS
- 6.0 CHANGE MANAGEMENT
- 7.0 PERSONNEL MANAGEMENT
- 8.0 PERFORMANCE MEASURES
- 9.0 WHAT TO DO WHENYOU GET HACKED
- 10.0 BOARDROOM INTERACTIONS
- APPENDIX A: POLICIES
- APPENDIX B: GENERAL RULES FOR EMAIL ETIQUETTE
- GLOSSARY
- SELECT BIBLIOGRAPHY
- INDEX
- END USER LICENSE AGREEMENT
Product information
- Title: Cybersecurity for Executives: A Practical Guide
- Author(s):
- Release date: July 2014
- Publisher(s): Wiley-AIChE
- ISBN: 9781118888148
You might also like
book
Official (ISC)2 Guide to the CAP CBK, 2nd Edition
Significant developments since the publication of its bestselling predecessor, Building and Implementing a Security Certification and …
book
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents
Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in …
book
Practical Cybersecurity Architecture
Plan and design robust security architectures to secure your organization's technology landscape and the applications you …
book
Foundations of Information Security
In this high-level survey of the information security field, best-selling author Jason Andress covers the basics …