Cybersecurity and Decision Makers

Cybersecurity and Decision Makers
Автор книги: id книги: 1887669     Оценка: 0.0     Голосов: 0     Отзывы, комментарии: 0 16753,6 руб.     (182,45$) Читать книгу Купить и скачать книгу Купить бумажную книгу Электронная книга Жанр: Зарубежная компьютерная литература Правообладатель и/или издательство: John Wiley & Sons Limited Дата добавления в каталог КнигаЛит: ISBN: 9781119720379 Скачать фрагмент в формате   fb2   fb2.zip Возрастное ограничение: 0+ Оглавление Отрывок из книги

Реклама. ООО «ЛитРес», ИНН: 7719571260.

Описание книги

Cyber security is a key issue affecting the confidence of Internet users and the sustainability of businesses. It is also a national issue with regards to economic development and resilience. As a concern, cyber risks are not only in the hands of IT security managers, but of everyone, and non-executive directors and managing directors may be held to account in relation to shareholders, customers, suppliers, employees, banks and public authorities. The implementation of a cybersecurity system, including processes, devices and training, is essential to protect a company against theft of strategic and personal data, sabotage and fraud. Cybersecurity and Decision Makers presents a comprehensive overview of cybercrime and best practice to confidently adapt to the digital world; covering areas such as risk mapping, compliance with the General Data Protection Regulation, cyber culture, ethics and crisis management. It is intended for anyone concerned about the protection of their data, as well as decision makers in any organization.

Оглавление

Marie De Fréminville. Cybersecurity and Decision Makers

Table of Contents

List of Tables

List of Illustrations

Guide

Pages

Cybersecurity and Decision Makers. Data Security and Digital Trust

Foreword

Preface

Introduction: Financial and Cyber Performance

1. An Increasingly Vulnerable World. 1.1. The context. 1.1.1. Technological disruptions and globalization

1.1.2. Data at the heart of industrial productivity

1.1.3. Cyberspace, an area without boundaries

1.1.4. IT resources

1.2. Cybercrime. 1.2.1. The concept of cybercrime

1.2.2. Five types of threats

1.2.2.1. Cyber espionage

1.2.2.2. Indirect attacks

1.2.2.3. Sabotage

1.2.2.4. Cryptojacking or cryptocurrency mining

1.2.2.5. Online fraud and cybercrime

1.2.3. Five types of attackers. 1.2.3.1. Looking for easy money

1.2.3.2. Cyberactivists/hacktivists

1.2.3.3. Competitors (or States) for the purpose of espionage or sabotage

1.2.3.4. Employees: the most frequent threat

1.2.3.5. The States

1.3. The cybersecurity market. 1.3.1. The size of the market and its evolution

1.3.2. The market by sector of activity

1.3.3. Types of purchases and investments

1.3.4. Geographical distribution

1.4. Cyber incidents. 1.4.1. The facts

1.4.1.1. Information on cybercrime

1.4.1.2. The origin of the threats

1.4.1.3. Their implementation

1.4.1.4. The targets

1.4.1.5. The worst shoemakers in the world

1.4.2. Testimonials versus silence

1.4.3. Trends. 1.4.3.1. Cybercriminal methods

1.4.3.2. The attackers

1.4.3.3. Connected objects

1.4.3.4. Cyberwarfare

1.4.4. Examples. 1.4.4.1. Information leaks

1.4.4.2. Some examples of famous attacks

1.5. Examples of particularly exposed sectors of activity. 1.5.1. Cinema

1.5.2. Banks

1.5.3. Health

1.5.4. Tourism and business hotels

1.5.5. Critical national infrastructure. 1.5.5.1. Military Programming Act

1.5.5.2. Issues for officers and directors

1.6. Responsibilities of officers and directors

Box 1.1.The five questions to ask yourself regularly

2. Corporate Governance and Digital Responsibility. 2.1. Corporate governance and stakeholders

2.2. The shareholders

2.2.1. Valuation of the company

2.2.2. Cyber rating agencies

2.2.3. Insider trading

2.2.4. Activist shareholders

2.2.5. The stock exchange authorities

2.2.6. The annual report

2.3. The board of directors. 2.3.1. The facts

2.3.2. The four missions of the board of directors

2.3.3. Civil and criminal liability

2.3.4. The board of directors and cybersecurity

2.3.4.1. Taking charge of the company’s digital destiny

2.3.4.2. Reinventing the board of directors?

2.3.5. The board of directors and data protection

2.3.6. The statutory auditors

2.3.7. The numerical responsibility of the board of directors

2.4. Customers and suppliers

2.5. Operational management. 2.5.1. The impacts of digital transformation

2.5.2. The digital strategy

2.5.2.1. Several possible and complementary answers

2.5.3. The consequences of poor digital performance

2.5.4. Cybersecurity

2.5.5. Merger and acquisition transactions

2.5.6. Governance and data protection, cybersecurity. 2.5.6.1. Internal data

2.5.6.2. Customer data

2.5.6.3. Open data and personal data protection

2.5.6.4. Public data – acute spying?

Box 2.1.Cyber-risks are strategic risks: the five arguments to convince the board of directors and management

3. Risk Mapping. 3.1. Cyber-risks

3.2. The context

3.3. Vulnerabilities

3.3.1. Fraud against the president

3.3.2. Supplier fraud

3.3.3. Other economic impacts

3.4. Legal risks. 3.4.1. Class actions

3.4.2. Sanctions by the CNIL and the ICO

3.5. The objectives of risk mapping

3.6. The different methods of risk analysis

3.7. Risk assessment (identify)

3.7.1. The main actors

3.7.2. The steps

3.8. Protecting

3.9. Detecting

3.10. Reacting

3.11. Restoring

3.12. Decentralized mapping. 3.12.1. The internal threat

3.12.2. Industrial risks

3.12.3. Suppliers, subcontractors and service providers

3.12.4. Connected objects

3.13. Insurance

3.14. Non-compliance risks and ethics

Box 3.1.The five questions to ask my CISO, trades and functions

4. Regulations. 4.1. The context

4.1.1. Complaints filed with the CNIL

4.1.2. Vectaury

4.1.3. Optical Center

4.1.4. Dailymotion

4.2. The different international regulations (data protection)

4.2.1. The United States

4.2.2. China

4.2.3. Asia

4.2.4. Europe

4.3. Cybersecurity regulations, the NIS Directive

4.4. Sectoral regulations. 4.4.1. The banking industry

4.4.2. Health

4.5. The General Data Protection Regulation (GDPR)

4.5.1. The foundations

4.5.2. Definition of personal data

4.5.3. The so-called “sensitive” data

4.5.4. The principles of the GDPR. 4.5.4.1. Transparency

4.5.4.2. Minimization

4.5.4.3. Data security

4.5.4.4. Accountability

4.5.5. The five actions to be in compliance with the GDPR

4.5.6. The processing register

4.5.7. The five actions to be carried out. 4.5.7.1. Appointment of a DPO

4.5.7.2. Compliance plan

4.5.7.3. Produce/update the processing of personal data

4.5.7.4. Update websites/documents

4.5.7.5. Write to subcontractors and partners affected

4.5.8. Cookies

4.6. Consequences for the company and the board of directors

Box 4.1.The five points of vigilance regarding data protection

5. Best Practices of the Board of Directors

5.1. Digital skills

5.2. Situational awareness

5.2.1. The main issues

5.2.1.1. It starts with the CEO! –tone from the top

5.2.1.2. Avoiding the method of checking checklists of checkpoints

5.2.1.3. Assigning clear supervisory responsibilities at the board level

5.2.1.4. Requiring evaluations, tests and reports

5.2.1.5. Remaining vigilant at all times

5.2.1.6. Being informed and understanding incidents

5.2.1.7. Anticipating

Box 5.1.Five questions for the board of directors

5.2.2. Insurance

5.3. Internal governance. 5.3.1. The CISO

5.3.2. The CISO and the company

5.3.3. Clarifying responsibilities

5.3.4. Streamlining the supplier portfolio

5.3.5. Security policies and procedures

5.3.5.1. The cloud strategy

5.3.5.2. The bring your own device (BYOD) strategy

5.3.6. The human being

5.4. Data protection

5.4.1. Emails

5.4.2. The tools

5.4.3. Double authentication: better, but not 100% reliable

5.5. Choosing your service providers

5.6. The budget

5.7. Cyberculture

5.8. The dashboard for officers and directors

Box 5.2.Best practices: the five questions to be asked regularly

6. Resilience and Crisis Management. 6.1. How to ensure resilience?

6.2. Definition of a CERT

6.3. Definition of a SOC

6.4. The role of ENISA

Box 6.1.The conditions of resilience: five points to remember

6.5. The business continuity plan

6.6. Crisis management. 6.6.1. The preparation

6.6.2. Exiting the state of sideration

6.6.3. Ensuring business continuity

6.6.4. Story of the TV5 Monde attack

6.6.5. Management of the first few hours. 6.6.5.1. Emergency measures

6.6.5.2. The payment of the ransom

6.6.5.3. Medium-term management

6.6.5.4. Long-term management

6.7. Crisis simulation

Box 6.2.Crisis management: five recommendations

Conclusion: The Digital Committee

Appendix 1. Cybersecurity Dashboard

Appendix 2. Ensuring Cybersecurity in Practice and on a Daily Basis

Appendix 3. Tools to Identify, Protect, Detect, Train, React and Restore. A3.1 Identify

A3.2. Protecting

A3.3. Training and governance

A3.4. Detecting

A3.5. Reacting

A3.6. Restoring

Glossary

References

Index. A, B, C, D

E, F, G, I, L

M, N, P, R, S

WILEY END USER LICENSE AGREEMENT

Отрывок из книги

Marie de Fréminville

.....

Cyber-risk is an integral part of companies and also of personal organizations (everyone is concerned individually and as a member of an organization). It is not just a technical risk.

People are the weakest (and strongest) link in the entire safety chain.

.....

Добавление нового отзыва

Комментарий Поле, отмеченное звёздочкой  — обязательно к заполнению

Отзывы и комментарии читателей

Нет рецензий. Будьте первым, кто напишет рецензию на книгу Cybersecurity and Decision Makers
Подняться наверх