NLU Meghalaya Library

Online Public Access Catalogue (OPAC)

Amazon cover image
Image from Amazon.com

Cybersecurity and decision makers : data security and digital trust / Marie de Fr�eminville.

By: Material type: TextSeries: Information systems, web and pervasive computing seriesPublisher: London : ISTE Ltd ; Hoboken, NJ : John Wiley & Sons, Inc., 2020Description: 1 online resource : illustrationsContent type:
  • text
  • still image
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 1119720354
  • 9781119720355
  • 9781119720362
  • 1119720362
  • 9781119720379
  • 1119720370
Subject(s): Additional physical formats: Print version:: Cybersecurity and Decision Makers : Data Security and Digital Trust.DDC classification:
  • 658.478 23
  • 005.8 23
LOC classification:
  • HF5548.37 .F74 2020
  • QA76.9.A25 F74 2020eb
Online resources:
Contents:
Cover -- Half-Title Page -- Title Page -- Copyright Page -- Contents -- Foreword -- Preface -- Introduction: Financial and Cyber Performance -- 1. An Increasingly Vulnerable World -- 1.1. The context -- 1.1.1. Technological disruptions and globalization -- 1.1.2. Data at the heart of industrial productivity -- 1.1.3. Cyberspace, an area without boundaries -- 1.1.4. IT resources -- 1.2. Cybercrime -- 1.2.1. The concept of cybercrime -- 1.2.2. Five types of threats -- 1.2.3. Five types of attackers -- 1.3. The cybersecurity market -- 1.3.1. The size of the market and its evolution
1.3.2. The market by sector of activity -- 1.3.3. Types of purchases and investments -- 1.3.4. Geographical distribution -- 1.4. Cyber incidents -- 1.4.1. The facts -- 1.4.2. Testimonials versus silence -- 1.4.3. Trends -- 1.4.4. Examples -- 1.5. Examples of particularly exposed sectors of activity -- 1.5.1. Cinema -- 1.5.2. Banks -- 1.5.3. Health -- 1.5.4. Tourism and business hotels -- 1.5.5. Critical national infrastructure -- 1.6. Responsibilities of officers and directors -- 2. Corporate Governance and Digital Responsibility -- 2.1. Corporate governance and stakeholders
2.2. The shareholders -- 2.2.1. Valuation of the company -- 2.2.2. Cyber rating agencies -- 2.2.3. Insider trading -- 2.2.4. Activist shareholders -- 2.2.5. The stock exchange authorities -- 2.2.6. The annual report -- 2.3. The board of directors -- 2.3.1. The facts -- 2.3.2. The four missions of the board of directors -- 2.3.3. Civil and criminal liability -- 2.3.4. The board of directors and cybersecurity -- 2.3.5. The board of directors and data protection -- 2.3.6. The statutory auditors -- 2.3.7. The numerical responsibility of the board of directors -- 2.4. Customers and suppliers
2.5. Operational management -- 2.5.1. The impacts of digital transformation -- 2.5.2. The digital strategy -- 2.5.3. The consequences of poor digital performance -- 2.5.4. Cybersecurity -- 2.5.5. Merger and acquisition transactions -- 2.5.6. Governance and data protection, cybersecurity -- 3. Risk Mapping -- 3.1. Cyber-risks -- 3.2. The context -- 3.3. Vulnerabilities -- 3.3.1. Fraud against the president -- 3.3.2. Supplier fraud -- 3.3.3. Other economic impacts -- 3.4. Legal risks -- 3.4.1. Class actions -- 3.4.2. Sanctions by the CNIL and the ICO -- 3.5. The objectives of risk mapping
3.6. The different methods of risk analysis -- 3.7. Risk assessment (identify) -- 3.7.1. The main actors -- 3.7.2. The steps -- 3.8. Protecting -- 3.9. Detecting -- 3.10. Reacting -- 3.11. Restoring -- 3.12. Decentralized mapping -- 3.12.1. The internal threat -- 3.12.2. Industrial risks -- 3.12.3. Suppliers, subcontractors and service providers -- 3.12.4. Connected objects -- 3.13. Insurance -- 3.14. Non-compliance risks and ethics -- 4. Regulations -- 4.1. The context -- 4.1.1. Complaints filed with the CNIL -- 4.1.2. Vectaury -- 4.1.3. Optical Center -- 4.1.4. Dailymotion
Summary: Cyber security is a key issue affecting the confidence of Internet users and the sustainability of businesses. It is also a national issue with regards to economic development and resilience. As a concern, cyber risks are not only in the hands of IT security managers, but of everyone, and non-executive directors and managing directors may be held to account in relation to shareholders, customers, suppliers, employees, banks and public authorities. The implementation of a cybersecurity system, including processes, devices and training, is essential to protect a company against theft of strategic and personal data, sabotage and fraud. Cybersecurity and Decision Makers presents a comprehensive overview of cybercrime and best practice to confidently adapt to the digital world; covering areas such as risk mapping, compliance with the General Data Protection Regulation, cyber culture, ethics and crisis management. It is intended for anyone concerned about the protection of their data, as well as decision makers in any organization.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Online resource; title from digital title page (viewed on May 14, 2020).

Cover -- Half-Title Page -- Title Page -- Copyright Page -- Contents -- Foreword -- Preface -- Introduction: Financial and Cyber Performance -- 1. An Increasingly Vulnerable World -- 1.1. The context -- 1.1.1. Technological disruptions and globalization -- 1.1.2. Data at the heart of industrial productivity -- 1.1.3. Cyberspace, an area without boundaries -- 1.1.4. IT resources -- 1.2. Cybercrime -- 1.2.1. The concept of cybercrime -- 1.2.2. Five types of threats -- 1.2.3. Five types of attackers -- 1.3. The cybersecurity market -- 1.3.1. The size of the market and its evolution

1.3.2. The market by sector of activity -- 1.3.3. Types of purchases and investments -- 1.3.4. Geographical distribution -- 1.4. Cyber incidents -- 1.4.1. The facts -- 1.4.2. Testimonials versus silence -- 1.4.3. Trends -- 1.4.4. Examples -- 1.5. Examples of particularly exposed sectors of activity -- 1.5.1. Cinema -- 1.5.2. Banks -- 1.5.3. Health -- 1.5.4. Tourism and business hotels -- 1.5.5. Critical national infrastructure -- 1.6. Responsibilities of officers and directors -- 2. Corporate Governance and Digital Responsibility -- 2.1. Corporate governance and stakeholders

2.2. The shareholders -- 2.2.1. Valuation of the company -- 2.2.2. Cyber rating agencies -- 2.2.3. Insider trading -- 2.2.4. Activist shareholders -- 2.2.5. The stock exchange authorities -- 2.2.6. The annual report -- 2.3. The board of directors -- 2.3.1. The facts -- 2.3.2. The four missions of the board of directors -- 2.3.3. Civil and criminal liability -- 2.3.4. The board of directors and cybersecurity -- 2.3.5. The board of directors and data protection -- 2.3.6. The statutory auditors -- 2.3.7. The numerical responsibility of the board of directors -- 2.4. Customers and suppliers

2.5. Operational management -- 2.5.1. The impacts of digital transformation -- 2.5.2. The digital strategy -- 2.5.3. The consequences of poor digital performance -- 2.5.4. Cybersecurity -- 2.5.5. Merger and acquisition transactions -- 2.5.6. Governance and data protection, cybersecurity -- 3. Risk Mapping -- 3.1. Cyber-risks -- 3.2. The context -- 3.3. Vulnerabilities -- 3.3.1. Fraud against the president -- 3.3.2. Supplier fraud -- 3.3.3. Other economic impacts -- 3.4. Legal risks -- 3.4.1. Class actions -- 3.4.2. Sanctions by the CNIL and the ICO -- 3.5. The objectives of risk mapping

3.6. The different methods of risk analysis -- 3.7. Risk assessment (identify) -- 3.7.1. The main actors -- 3.7.2. The steps -- 3.8. Protecting -- 3.9. Detecting -- 3.10. Reacting -- 3.11. Restoring -- 3.12. Decentralized mapping -- 3.12.1. The internal threat -- 3.12.2. Industrial risks -- 3.12.3. Suppliers, subcontractors and service providers -- 3.12.4. Connected objects -- 3.13. Insurance -- 3.14. Non-compliance risks and ethics -- 4. Regulations -- 4.1. The context -- 4.1.1. Complaints filed with the CNIL -- 4.1.2. Vectaury -- 4.1.3. Optical Center -- 4.1.4. Dailymotion

Cyber security is a key issue affecting the confidence of Internet users and the sustainability of businesses. It is also a national issue with regards to economic development and resilience. As a concern, cyber risks are not only in the hands of IT security managers, but of everyone, and non-executive directors and managing directors may be held to account in relation to shareholders, customers, suppliers, employees, banks and public authorities. The implementation of a cybersecurity system, including processes, devices and training, is essential to protect a company against theft of strategic and personal data, sabotage and fraud. Cybersecurity and Decision Makers presents a comprehensive overview of cybercrime and best practice to confidently adapt to the digital world; covering areas such as risk mapping, compliance with the General Data Protection Regulation, cyber culture, ethics and crisis management. It is intended for anyone concerned about the protection of their data, as well as decision makers in any organization.

John Wiley and Sons Wiley Online Library: Complete oBooks

There are no comments on this title.

to post a comment.