Author: Mark Butterhoff
Publisher: Vior Webmedia
ISBN: 9090335358
Category : Business & Economics
Languages : en
Pages : 192
Book Description
Over the years we’ve seen the digital security profession transformed into an overhyped and fuzzy domain that is often referred to as cybersecurity. Over the years we've seen the digital security profession transformed into an overhyped and fuzzy domain that is often referred to as cybersecurity. Since many authors have written a great deal on this subject in books, journals, and social media blogs, our aim here is to enrich this field with our opinions, -viewpoints, and expertise. Thanks to a combined total of forty-five years of experience - experience from our academic back grounds as well as from our work as security and tech leaders we are able to focus on things that should work in theory but fail in practice due to all kinds of intangible, "silent" factors. Our intention is not to be exhaustive, nor to criticize others, but to shed fresh light on crucial cyber-related allies, enemies, and issue that are rarely taken into account and talked about, but we believe you should know to help you combat the silent enemy of digital security.
Leading in Digital Security
Author: Mark Butterhoff
Publisher: Vior Webmedia
ISBN: 9090335358
Category : Business & Economics
Languages : en
Pages : 192
Book Description
Over the years we’ve seen the digital security profession transformed into an overhyped and fuzzy domain that is often referred to as cybersecurity. Over the years we've seen the digital security profession transformed into an overhyped and fuzzy domain that is often referred to as cybersecurity. Since many authors have written a great deal on this subject in books, journals, and social media blogs, our aim here is to enrich this field with our opinions, -viewpoints, and expertise. Thanks to a combined total of forty-five years of experience - experience from our academic back grounds as well as from our work as security and tech leaders we are able to focus on things that should work in theory but fail in practice due to all kinds of intangible, "silent" factors. Our intention is not to be exhaustive, nor to criticize others, but to shed fresh light on crucial cyber-related allies, enemies, and issue that are rarely taken into account and talked about, but we believe you should know to help you combat the silent enemy of digital security.
Publisher: Vior Webmedia
ISBN: 9090335358
Category : Business & Economics
Languages : en
Pages : 192
Book Description
Over the years we’ve seen the digital security profession transformed into an overhyped and fuzzy domain that is often referred to as cybersecurity. Over the years we've seen the digital security profession transformed into an overhyped and fuzzy domain that is often referred to as cybersecurity. Since many authors have written a great deal on this subject in books, journals, and social media blogs, our aim here is to enrich this field with our opinions, -viewpoints, and expertise. Thanks to a combined total of forty-five years of experience - experience from our academic back grounds as well as from our work as security and tech leaders we are able to focus on things that should work in theory but fail in practice due to all kinds of intangible, "silent" factors. Our intention is not to be exhaustive, nor to criticize others, but to shed fresh light on crucial cyber-related allies, enemies, and issue that are rarely taken into account and talked about, but we believe you should know to help you combat the silent enemy of digital security.
Optical and Digital Techniques for Information Security
Author: Bahram Javidi
Publisher: Springer Science & Business Media
ISBN: 0387250964
Category : Science
Languages : en
Pages : 356
Book Description
There are wide-ranging implications in information security beyond national defense. Securing our information has implications for virtually all aspects of our lives, including protecting the privacy of our ?nancial transactions and medical records, facilitating all operations of government, maintaining the integrity of national borders, securing important facilities, ensuring the safety of our food and commercial products, protecting the safety of our aviation system—even safeguarding the integrity of our very identity against theft. Information security is a vital element in all of these activities, particularly as information collection and distribution become ever more connected through electronic information delivery systems and commerce. This book encompasses results of research investigation and technologies that can be used to secure, protect, verify, and authenticate objects and inf- mation from theft, counterfeiting, and manipulation by unauthorized persons and agencies. The book has drawn on the diverse expertise in optical sciences and engineering, digital image processing, imaging systems, information p- cessing, mathematical algorithms, quantum optics, computer-based infor- tion systems, sensors, detectors, and biometrics to report novel technologies that can be applied to information-security issues. The book is unique because it has diverse contributions from the ?eld of optics, which is a new emerging technology for security, and digital techniques that are very accessible and can be interfaced with optics to produce highly e?ective security systems.
Publisher: Springer Science & Business Media
ISBN: 0387250964
Category : Science
Languages : en
Pages : 356
Book Description
There are wide-ranging implications in information security beyond national defense. Securing our information has implications for virtually all aspects of our lives, including protecting the privacy of our ?nancial transactions and medical records, facilitating all operations of government, maintaining the integrity of national borders, securing important facilities, ensuring the safety of our food and commercial products, protecting the safety of our aviation system—even safeguarding the integrity of our very identity against theft. Information security is a vital element in all of these activities, particularly as information collection and distribution become ever more connected through electronic information delivery systems and commerce. This book encompasses results of research investigation and technologies that can be used to secure, protect, verify, and authenticate objects and inf- mation from theft, counterfeiting, and manipulation by unauthorized persons and agencies. The book has drawn on the diverse expertise in optical sciences and engineering, digital image processing, imaging systems, information p- cessing, mathematical algorithms, quantum optics, computer-based infor- tion systems, sensors, detectors, and biometrics to report novel technologies that can be applied to information-security issues. The book is unique because it has diverse contributions from the ?eld of optics, which is a new emerging technology for security, and digital techniques that are very accessible and can be interfaced with optics to produce highly e?ective security systems.
Secrets and Lies
Author: Bruce Schneier
Publisher: John Wiley & Sons
ISBN: 1119092434
Category : Computers
Languages : en
Pages : 453
Book Description
This anniversary edition which has stood the test of time as a runaway best-seller provides a practical, straight-forward guide to achieving security throughout computer networks. No theory, no math, no fiction of what should be working but isn't, just the facts. Known as the master of cryptography, Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. A much-touted section: Schneier's tutorial on just what cryptography (a subset of computer security) can and cannot do for them, has received far-reaching praise from both the technical and business community. Praise for Secrets and Lies "This is a business issue, not a technical one, and executives can no longer leave such decisions to techies. That's why Secrets and Lies belongs in every manager's library."-Business Week "Startlingly lively....a jewel box of little surprises you can actually use."-Fortune "Secrets is a comprehensive, well-written work on a topic few business leaders can afford to neglect."-Business 2.0 "Instead of talking algorithms to geeky programmers, [Schneier] offers a primer in practical computer security aimed at those shopping, communicating or doing business online-almost everyone, in other words."-The Economist "Schneier...peppers the book with lively anecdotes and aphorisms, making it unusually accessible."-Los Angeles Times With a new and compelling Introduction by the author, this premium edition will become a keepsake for security enthusiasts of every stripe.
Publisher: John Wiley & Sons
ISBN: 1119092434
Category : Computers
Languages : en
Pages : 453
Book Description
This anniversary edition which has stood the test of time as a runaway best-seller provides a practical, straight-forward guide to achieving security throughout computer networks. No theory, no math, no fiction of what should be working but isn't, just the facts. Known as the master of cryptography, Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. A much-touted section: Schneier's tutorial on just what cryptography (a subset of computer security) can and cannot do for them, has received far-reaching praise from both the technical and business community. Praise for Secrets and Lies "This is a business issue, not a technical one, and executives can no longer leave such decisions to techies. That's why Secrets and Lies belongs in every manager's library."-Business Week "Startlingly lively....a jewel box of little surprises you can actually use."-Fortune "Secrets is a comprehensive, well-written work on a topic few business leaders can afford to neglect."-Business 2.0 "Instead of talking algorithms to geeky programmers, [Schneier] offers a primer in practical computer security aimed at those shopping, communicating or doing business online-almost everyone, in other words."-The Economist "Schneier...peppers the book with lively anecdotes and aphorisms, making it unusually accessible."-Los Angeles Times With a new and compelling Introduction by the author, this premium edition will become a keepsake for security enthusiasts of every stripe.
A Leader's Guide to Cybersecurity
Author: Thomas J. Parenty
Publisher: Harvard Business Press
ISBN: 1633698009
Category : Business & Economics
Languages : en
Pages : 162
Book Description
Cybersecurity threats are on the rise. As a leader, you need to be prepared to keep your organization safe. Companies are investing an unprecedented amount of money to keep their data and assets safe, yet cyberattacks are on the rise--and the problem is worsening. No amount of technology, resources, or policies will reverse this trend. Only sound governance, originating with the board, can turn the tide. Protection against cyberattacks can't be treated as a problem solely belonging to an IT or cybersecurity department. It needs to cast a wide and impenetrable net that covers everything an organization does--from its business operations, models, and strategies to its products and intellectual property. And boards are in the best position to oversee the needed changes to strategy and hold their companies accountable. Not surprisingly, many boards aren't prepared to assume this responsibility. In A Leader's Guide to Cybersecurity, Thomas Parenty and Jack Domet, who have spent over three decades in the field, present a timely, clear-eyed, and actionable framework that will empower senior executives and board members to become stewards of their companies' cybersecurity activities. This includes: Understanding cyber risks and how best to control them Planning and preparing for a crisis--and leading in its aftermath Making cybersecurity a companywide initiative and responsibility Drawing attention to the nontechnical dynamics that influence the effectiveness of cybersecurity measures Aligning the board, executive leadership, and cybersecurity teams on priorities Filled with tools, best practices, and strategies, A Leader's Guide to Cybersecurity will help boards navigate this seemingly daunting but extremely necessary transition.
Publisher: Harvard Business Press
ISBN: 1633698009
Category : Business & Economics
Languages : en
Pages : 162
Book Description
Cybersecurity threats are on the rise. As a leader, you need to be prepared to keep your organization safe. Companies are investing an unprecedented amount of money to keep their data and assets safe, yet cyberattacks are on the rise--and the problem is worsening. No amount of technology, resources, or policies will reverse this trend. Only sound governance, originating with the board, can turn the tide. Protection against cyberattacks can't be treated as a problem solely belonging to an IT or cybersecurity department. It needs to cast a wide and impenetrable net that covers everything an organization does--from its business operations, models, and strategies to its products and intellectual property. And boards are in the best position to oversee the needed changes to strategy and hold their companies accountable. Not surprisingly, many boards aren't prepared to assume this responsibility. In A Leader's Guide to Cybersecurity, Thomas Parenty and Jack Domet, who have spent over three decades in the field, present a timely, clear-eyed, and actionable framework that will empower senior executives and board members to become stewards of their companies' cybersecurity activities. This includes: Understanding cyber risks and how best to control them Planning and preparing for a crisis--and leading in its aftermath Making cybersecurity a companywide initiative and responsibility Drawing attention to the nontechnical dynamics that influence the effectiveness of cybersecurity measures Aligning the board, executive leadership, and cybersecurity teams on priorities Filled with tools, best practices, and strategies, A Leader's Guide to Cybersecurity will help boards navigate this seemingly daunting but extremely necessary transition.
Leading Digital
Author: George Westerman
Publisher: Harvard Business Review Press
ISBN: 1625272480
Category : Business & Economics
Languages : en
Pages : 303
Book Description
Become a Digital Master—No Matter What Business You’re In If you think the phrase “going digital” is only relevant for industries like tech, media, and entertainment—think again. In fact, mobile, analytics, social media, sensors, and cloud computing have already fundamentally changed the entire business landscape as we know it—including your industry. The problem is that most accounts of digital in business focus on Silicon Valley stars and tech start-ups. But what about the other 90-plus percent of the economy? In Leading Digital, authors George Westerman, Didier Bonnet, and Andrew McAfee highlight how large companies in traditional industries—from finance to manufacturing to pharmaceuticals—are using digital to gain strategic advantage. They illuminate the principles and practices that lead to successful digital transformation. Based on a study of more than four hundred global firms, including Asian Paints, Burberry, Caesars Entertainment, Codelco, Lloyds Banking Group, Nike, and Pernod Ricard, the book shows what it takes to become a Digital Master. It explains successful transformation in a clear, two-part framework: where to invest in digital capabilities, and how to lead the transformation. Within these parts, you’ll learn: • How to engage better with your customers • How to digitally enhance operations • How to create a digital vision • How to govern your digital activities The book also includes an extensive step-by-step transformation playbook for leaders to follow. Leading Digital is the must-have guide to help your organization survive and thrive in the new, digitally powered, global economy.
Publisher: Harvard Business Review Press
ISBN: 1625272480
Category : Business & Economics
Languages : en
Pages : 303
Book Description
Become a Digital Master—No Matter What Business You’re In If you think the phrase “going digital” is only relevant for industries like tech, media, and entertainment—think again. In fact, mobile, analytics, social media, sensors, and cloud computing have already fundamentally changed the entire business landscape as we know it—including your industry. The problem is that most accounts of digital in business focus on Silicon Valley stars and tech start-ups. But what about the other 90-plus percent of the economy? In Leading Digital, authors George Westerman, Didier Bonnet, and Andrew McAfee highlight how large companies in traditional industries—from finance to manufacturing to pharmaceuticals—are using digital to gain strategic advantage. They illuminate the principles and practices that lead to successful digital transformation. Based on a study of more than four hundred global firms, including Asian Paints, Burberry, Caesars Entertainment, Codelco, Lloyds Banking Group, Nike, and Pernod Ricard, the book shows what it takes to become a Digital Master. It explains successful transformation in a clear, two-part framework: where to invest in digital capabilities, and how to lead the transformation. Within these parts, you’ll learn: • How to engage better with your customers • How to digitally enhance operations • How to create a digital vision • How to govern your digital activities The book also includes an extensive step-by-step transformation playbook for leaders to follow. Leading Digital is the must-have guide to help your organization survive and thrive in the new, digitally powered, global economy.
Digital Privacy and Security Using Windows
Author: Nihad Hassan
Publisher: Apress
ISBN: 1484227999
Category : Computers
Languages : en
Pages : 302
Book Description
Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques. This book teaches you how to secure your online identity and personal devices, encrypt your digital data and online communications, protect cloud data and Internet of Things (IoT), mitigate social engineering attacks, keep your purchases secret, and conceal your digital footprint. You will understand best practices to harden your operating system and delete digital traces using the most widely used operating system, Windows. Digital Privacy and Security Using Windows offers a comprehensive list of practical digital privacy tutorials in addition to being a complete repository of free online resources and tools assembled in one place. The book helps you build a robust defense from electronic crime and corporate surveillance. It covers general principles of digital privacy and how to configure and use various security applications to maintain your privacy, such as TOR, VPN, and BitLocker. You will learn to encrypt email communications using Gpg4win and Thunderbird. What You’ll Learn Know the various parties interested in having your private data Differentiate between government and corporate surveillance, and the motivations behind each one Understand how online tracking works technically Protect digital data, secure online communications, and become anonymous online Cover and destroy your digital traces using Windows OS Secure your data in transit and at rest Be aware of cyber security risks and countermeasures Who This Book Is For End users, information security professionals, management, infosec students
Publisher: Apress
ISBN: 1484227999
Category : Computers
Languages : en
Pages : 302
Book Description
Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques. This book teaches you how to secure your online identity and personal devices, encrypt your digital data and online communications, protect cloud data and Internet of Things (IoT), mitigate social engineering attacks, keep your purchases secret, and conceal your digital footprint. You will understand best practices to harden your operating system and delete digital traces using the most widely used operating system, Windows. Digital Privacy and Security Using Windows offers a comprehensive list of practical digital privacy tutorials in addition to being a complete repository of free online resources and tools assembled in one place. The book helps you build a robust defense from electronic crime and corporate surveillance. It covers general principles of digital privacy and how to configure and use various security applications to maintain your privacy, such as TOR, VPN, and BitLocker. You will learn to encrypt email communications using Gpg4win and Thunderbird. What You’ll Learn Know the various parties interested in having your private data Differentiate between government and corporate surveillance, and the motivations behind each one Understand how online tracking works technically Protect digital data, secure online communications, and become anonymous online Cover and destroy your digital traces using Windows OS Secure your data in transit and at rest Be aware of cyber security risks and countermeasures Who This Book Is For End users, information security professionals, management, infosec students
Digital to the Core
Author: Mark Raskino
Publisher: Routledge
ISBN: 1351861980
Category : Business & Economics
Languages : en
Pages : 281
Book Description
There is no simple strategic method for dealing with the multidimensional nature of digital change. Even the sharpest leaders can become disoriented as change builds on change, leaving almost nothing certain. Yet to stand still is to fail. Enterprises and leaders must re-master themselves to succeed. Leaders must identify the key macro forces, then lead their organizations at three distinct levels: industry, enterprise, and self. By doing this they cannot only survive but clean up. Digital to the Core makes the case that all business leaders must understand the impact the digital revolution will continue to play in their industries, companies, and leadership style and practices. Drawing on interviews with over 30 top C-level executives in some of the world's most powerful companies and government organizations, including GE, Ford, Tory Burch, Babolat, McDonalds, Publicis and UK Government Digital Service, this book delivers practical insights from those on the front lines of major digital upheaval. The authors incorporate Gartner's annual CIO and CEO global survey research and also apply the deep knowledge and qualitative insights they have acquired as practitioners, management researchers, and advisors over decades in the business. Above all else, Raskino and Waller want companies and their top leaders to understand the full impact of digital change and integrate it at the core of their businesses.
Publisher: Routledge
ISBN: 1351861980
Category : Business & Economics
Languages : en
Pages : 281
Book Description
There is no simple strategic method for dealing with the multidimensional nature of digital change. Even the sharpest leaders can become disoriented as change builds on change, leaving almost nothing certain. Yet to stand still is to fail. Enterprises and leaders must re-master themselves to succeed. Leaders must identify the key macro forces, then lead their organizations at three distinct levels: industry, enterprise, and self. By doing this they cannot only survive but clean up. Digital to the Core makes the case that all business leaders must understand the impact the digital revolution will continue to play in their industries, companies, and leadership style and practices. Drawing on interviews with over 30 top C-level executives in some of the world's most powerful companies and government organizations, including GE, Ford, Tory Burch, Babolat, McDonalds, Publicis and UK Government Digital Service, this book delivers practical insights from those on the front lines of major digital upheaval. The authors incorporate Gartner's annual CIO and CEO global survey research and also apply the deep knowledge and qualitative insights they have acquired as practitioners, management researchers, and advisors over decades in the business. Above all else, Raskino and Waller want companies and their top leaders to understand the full impact of digital change and integrate it at the core of their businesses.
Global Business Leadership Development for the Fourth Industrial Revolution
Author: Smith, Peter
Publisher: IGI Global
ISBN: 1799848620
Category : Business & Economics
Languages : en
Pages : 425
Book Description
As the world has adapted to the age of digital technology, present day business leaders are required to change with the times as well. Addressing and formatting their business practices to not only encompass digital technologies, but expand their capabilities, the leaders of today must be flexible and willing to familiarize themselves with all types of global business practices. Global Business Leadership Development for the Fourth Industrial Revolution is a collection of advanced research on the methods and tactics utilized to succeed as a leader in the digital age. While highlighting topics including data privacy, corporate governance, and risk management, this book is ideally designed for business professionals, administrators, managers, executives, researchers, academicians, and business students who want to improve their understanding of the strategic role of digital technologies in the global economy, in networks and organizations, in teams and work groups, in information systems, and at the level of individuals as actors in digitally networked environments
Publisher: IGI Global
ISBN: 1799848620
Category : Business & Economics
Languages : en
Pages : 425
Book Description
As the world has adapted to the age of digital technology, present day business leaders are required to change with the times as well. Addressing and formatting their business practices to not only encompass digital technologies, but expand their capabilities, the leaders of today must be flexible and willing to familiarize themselves with all types of global business practices. Global Business Leadership Development for the Fourth Industrial Revolution is a collection of advanced research on the methods and tactics utilized to succeed as a leader in the digital age. While highlighting topics including data privacy, corporate governance, and risk management, this book is ideally designed for business professionals, administrators, managers, executives, researchers, academicians, and business students who want to improve their understanding of the strategic role of digital technologies in the global economy, in networks and organizations, in teams and work groups, in information systems, and at the level of individuals as actors in digitally networked environments
Digital Leader: 5 Simple Keys to Success and Influence
Author: Erik Qualman
Publisher: McGraw Hill Professional
ISBN: 0071792449
Category : Business & Economics
Languages : en
Pages : 297
Book Description
Digital Leaders are Made—Not Born "Fail forward, fail fast, fail better is a winning concept from Qualman's latest book, Digital Leader." -- Tony Hsieh, New York Times bestselling author and CEO of Zappos.com, Inc. "People with a passion for something can be infectious. It's obvious that Erik Qualman's passion is social media." -- Dan Heath, New York Times bestselling author of Made to Stick and Switch "Qualman is to social media what Deming is to quality and Drucker to management." -- Scott Galloway, professor, Stern School of Business, NYU "Erik Qualman is a Digital Dale Carnegie." -- Todd Young, CEO, ProspX About the Book: "Digital footprints are what we post about ourselves. Digital shadows are what others upload about us. Collectively, they have changed the world forever. As leaders and future leaders we need to adapt to this new world." -- from Digital Leader Digital leaders are made, not born--you have it within you to become an effective digital leader. As a leader in the digital age, your reach is boundless. With advanced technologies, you can exert more direct and indirect influence than ever before--anywhere at any time. And everything you do, fail to do, and wish you didn't do is documented forever in the digital universe. Digital Leader explains how to take full advantage of everything the digital age has to offer, while avoiding common pitfalls that can damage your "digital legacy." Bestselling author Erik Qualman explains what modern leadership means and describes how to be an effective leader in the digital world. In order to succeed, you need to adjust your leadership skills to adapt to today's digitally open world--and you need to start today. Qualman breaks the process down into five powerful truths you can use to establish your leadership "stamp": Simple: success is the result of simplification and focus True: be true to your passion Act: nothing happens without action--take the first step Map: goals and visions are needed to get where you want to be People: success doesn't happen alone Basing his conclusions on a wide range of research and resources, Qualman provides an abundance of real-world examples and tips to help you create a path to success while leading others to achieve their best.
Publisher: McGraw Hill Professional
ISBN: 0071792449
Category : Business & Economics
Languages : en
Pages : 297
Book Description
Digital Leaders are Made—Not Born "Fail forward, fail fast, fail better is a winning concept from Qualman's latest book, Digital Leader." -- Tony Hsieh, New York Times bestselling author and CEO of Zappos.com, Inc. "People with a passion for something can be infectious. It's obvious that Erik Qualman's passion is social media." -- Dan Heath, New York Times bestselling author of Made to Stick and Switch "Qualman is to social media what Deming is to quality and Drucker to management." -- Scott Galloway, professor, Stern School of Business, NYU "Erik Qualman is a Digital Dale Carnegie." -- Todd Young, CEO, ProspX About the Book: "Digital footprints are what we post about ourselves. Digital shadows are what others upload about us. Collectively, they have changed the world forever. As leaders and future leaders we need to adapt to this new world." -- from Digital Leader Digital leaders are made, not born--you have it within you to become an effective digital leader. As a leader in the digital age, your reach is boundless. With advanced technologies, you can exert more direct and indirect influence than ever before--anywhere at any time. And everything you do, fail to do, and wish you didn't do is documented forever in the digital universe. Digital Leader explains how to take full advantage of everything the digital age has to offer, while avoiding common pitfalls that can damage your "digital legacy." Bestselling author Erik Qualman explains what modern leadership means and describes how to be an effective leader in the digital world. In order to succeed, you need to adjust your leadership skills to adapt to today's digitally open world--and you need to start today. Qualman breaks the process down into five powerful truths you can use to establish your leadership "stamp": Simple: success is the result of simplification and focus True: be true to your passion Act: nothing happens without action--take the first step Map: goals and visions are needed to get where you want to be People: success doesn't happen alone Basing his conclusions on a wide range of research and resources, Qualman provides an abundance of real-world examples and tips to help you create a path to success while leading others to achieve their best.
Digital Resilience
Author: Ray Rothrock
Publisher: AMACOM
ISBN: 081443925X
Category : Computers
Languages : en
Pages : 272
Book Description
In the Digital Age of the twenty-first century, the question is not if you will be targeted, but when. Are you prepared? If not, where does one begin? For an enterprise to be fully prepared for the immanent attack, it must be actively monitoring networks, taking proactive steps to understand and contain attacks, enabling continued operation during an incident, and have a full recovery plan already in place. Cybersecurity expert Ray Rothrock has provided for businesses large and small a must-have resource that highlights: the tactics used by today’s hackers, vulnerabilities lurking in networks, and strategies not just for surviving attacks, but thriving while under assault. Businesses and individuals will understand better the threats they face, be able to identify and address weaknesses, and respond to exploits swiftly and effectively. From data theft to downed servers, from malware to human error, cyber events can be triggered anytime from anywhere around the globe. Digital Resilience provides the resilience-building strategies your business needs to prevail--no matter what strikes.
Publisher: AMACOM
ISBN: 081443925X
Category : Computers
Languages : en
Pages : 272
Book Description
In the Digital Age of the twenty-first century, the question is not if you will be targeted, but when. Are you prepared? If not, where does one begin? For an enterprise to be fully prepared for the immanent attack, it must be actively monitoring networks, taking proactive steps to understand and contain attacks, enabling continued operation during an incident, and have a full recovery plan already in place. Cybersecurity expert Ray Rothrock has provided for businesses large and small a must-have resource that highlights: the tactics used by today’s hackers, vulnerabilities lurking in networks, and strategies not just for surviving attacks, but thriving while under assault. Businesses and individuals will understand better the threats they face, be able to identify and address weaknesses, and respond to exploits swiftly and effectively. From data theft to downed servers, from malware to human error, cyber events can be triggered anytime from anywhere around the globe. Digital Resilience provides the resilience-building strategies your business needs to prevail--no matter what strikes.