Beyond Cybersecurity
Реклама. ООО «ЛитРес», ИНН: 7719571260.
Оглавление
Kaplan James M.. Beyond Cybersecurity
Foreword
Preface
SETTING THE CONTEXT FOR DIGITAL RESILIENCE
BACKGROUND AND APPROACH
Executive Summary
$3 TRILLION AT RISK
DIGITAL RESILIENCE PROTECTS THE BUSINESS AND ENABLES INNOVATION
BUSINESS LEADERS MUST DRIVE CHANGE
THE BROADER ECOSYSTEM MUST ENABLE DIGITAL RESILIENCE
1. Cyber-attacks Jeopardize Companies’ Pace of Innovation
RISK OF CYBER-ATTACKS REDUCES THE VALUE OF TECHNOLOGY FOR BUSINESS
THE RISKS ARE HIGH FOR EVERYONE, EVERYWHERE
DEFENDERS ARE FALLING BEHIND ATTACKERS
2. It Could Get Better – or $3 Trillion Worse
SCENARIO PLANNING AND CYBERSECURITY
SCENARIO 1: MUDDLING INTO THE FUTURE
SCENARIO 2: DIGITAL BACKLASH
SCENARIO 3: DIGITAL RESILIENCE
3. Prioritize Risks and Target Protections
UNTARGETED SECURITY MEASURES SERVE ONLY ATTACKERS
PRIORITIZE INFORMATION ASSETS AND RISKS IN A WAY THAT ENGAGES BUSINESS LEADERS
PROVIDE DIFFERENTIATED PROTECTION FOR THE MOST IMPORTANT ASSETS
USE FULL RANGE OF CONTROLS BUT ORGANIZE INTO TIERS
DELIVERING TARGETED PROTECTION OF PRIORITY ASSETS IN PRACTICE
4. Do Business in a Digitally Resilient Way
BUILD DIGITAL RESILIENCE INTO ALL BUSINESS PROCESSES
ENLIST FRONTLINE PERSONNEL TO PROTECT THE ASSETS THEY USE
5. Modernize IT to Secure IT
SIX WAYS TO EMBED CYBERSECURITY INTO THE IT ENVIRONMENT
ENGAGE WITH IT LEADERS TO IMPLEMENT REQUIRED CHANGES
6. Engage Attackers with Active Defense
THE LIMITATIONS OF PASSIVE DEFENSE
KNOW THE ENEMY AND ACT ACCORDINGLY
7. After the Breach: Improve Incident Response across Business Functions
DRAW UP AN INCIDENT RESPONSE PLAN
TEST THE PLAN USING WAR GAMES
CONDUCT POSTMORTEMS ON REAL BREACHES TO IMPROVE IR PLAN
8. Build a Program that Drives toward Digital Resilience
WHAT IT TAKES TO GET TO DIGITAL RESILIENCE
SIX STEPS TO LAUNCH A DIGITAL RESILIENCE PROGRAM
9. Creating a Resilient Digital Ecosystem
THE DIGITAL ECOSYSTEM
THE POWER OF A RESILIENT DIGITAL ECOSYSTEM
WHAT’S REQUIRED TO CREATE A RESILIENT DIGITAL ECOSYSTEM
COLLABORATION FOR A RESILIENT ECOSYSTEM
Conclusion
Acknowledgments
About the Authors
JAMES M. KAPLAN
TUCKER BAILEY
CHRIS REZEK
DEREK O’HALLORAN
ALAN MARCUS
Index
WILEY END USER LICENSE AGREEMENT
Отрывок из книги
We live in a remarkable age of technology innovation. The speed with which we are able to communicate, collaborate, and transform our businesses and organizations is truly astounding. Yet the risk created by our increasing dependence on those technology advancements is equally astounding. The economic, operational, and reputational risks of technology are well known to anyone who has paid even passing attention to the almost daily security breach headlines.
In their research, so effectively laid out in this book, the authors explain why there is so much cyber insecurity today, how it has become such an intractable problem, why it could get worse, and what organizations, industries, and governments must do now to start to address the problem. Importantly, James Kaplan, Tucker Bailey, Chris Rezek, Derek O’Halloran, and Alan Marcus go beyond elucidating today’s risks and how to mitigate them, and extrapolate the downstream economic consequences if organizations don’t change their fundamental approach to cybersecurity.
.....
Although institutions must protect themselves, they do so in the context of a broader digital ecosystem (Figure P.1), which includes:
FIGURE P.1 Companies Face a Wide Range of Cybersecurity Risks
.....