Cybersecurity for Executives
Home > Science, Technology & Agriculture > Industrial chemistry and manufacturing technologies > Industrial chemistry and chemical engineering > Cybersecurity for Executives: A Practical Guide
Cybersecurity for Executives: A Practical Guide

Cybersecurity for Executives: A Practical Guide


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

Practical guide that can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business Emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues Covers 'What to Do When You Get Hacked?' including Business Continuity and Disaster Recovery planning, Public Relations, Legal and Regulatory issues, and Notifications and Disclosures Provides steps for integrating cybersecurity into Strategy; Policy and Guidelines; Change Management and Personnel Management Identifies cybersecurity best practices that executives can and should use both in the office and at home to protect their vital information

Table of Contents:
Foreword xiii Preface xvii Acknowledgments xxiii 1.0 Introduction 1 1.1 Defining Cybersecurity 1 1.2 Cybersecurity is a Business Imperative 2 1.3 Cybersecurity is an Executive-Level Concern 4 1.4 Questions to Ask 4 1.5 Views of Others 7 1.6 Cybersecurity is a Full-Time Activity 7 2.0 Why Be Concerned? 9 2.1 A Classic Hack 9 2.2 Who Wants Your Fortune? 12 2.3 Nation-State Threats 13 2.3.1 China 13 2.3.2 Don’t Think that China is the Only One 17 2.4 Cybercrime is Big Business 20 2.4.1 Mercenary Hackers 20 2.4.2 Hacktivists 25 2.4.3 The Insider Threat 26 2.4.4 Substandard Products and Services 29 2.5 Summary 36 3.0 Managing Risk 37 3.1 Who Owns Risk in Your Business? 37 3.2 What are Your Risks? 38 3.2.1 Threats to Your Intellectual Property and Trade Secrets 38 3.2.2 Technical Risks 42 3.2.3 Human Risks 47 3.3 Calculating Your Risk 54 3.3.1 Quantitative Risk Assessment 55 3.3.2 Qualitative Risk Assessment 63 3.3.3 Risk Decisions 71 3.4 Communicating Risk 77 3.4.1 Communicating Risk Internally 78 3.4.2 Regulatory Communications 79 3.4.3 Communicating with Shareholders 86 3.5 Organizing for Success 89 3.5.1 Risk Management Committee 89 3.5.2 Chief Risk Officers 90 3.6 Summary 91 4.0 Build Your Strategy 95 4.1 How Much “Cybersecurity” Do I Need? 95 4.2 The Mechanics of Building Your Strategy 97 4.2.1 Where are We Now? 99 4.2.2 What do We have to Work with? 103 4.2.3 Where do We Want to be? 104 4.2.4 How do We Get There? 107 4.2.5 Goals and Objectives 108 4.3 Avoiding Strategy Failure 111 4.3.1 Poor Plans, Poor Execution 111 4.3.2 Lack of Communication 113 4.3.3 Resistance to Change 114 4.3.4 Lack of Leadership and Oversight 117 4.4 Ways to Incorporate Cybersecurity into Your Strategy 118 4.4.1 Identify the Information Critical to Your Business 119 4.4.2 Make Cybersecurity Part of Your Culture 119 4.4.3 Consider Cybersecurity Impacts in Your Decisions 119 4.4.4 Measure Your Progress 120 4.5 Plan For Success 121 4.6 Summary 123 5.0 Plan For Success 125 5.1 Turning Vision into Reality 125 5.1.1 Planning for Excellence 127 5.1.2 A Plan of Action 128 5.1.3 Doing Things 131 5.2 Policies Complement Plans 140 5.2.1 Great Cybersecurity Policies for Everyone 140 5.2.2 Be Clear about Your Policies and Who Owns Them 188 5.3 Procedures Implement Plans 190 5.4 Exercise Your Plans 191 5.5 Legal Compliance Concerns 193 5.6 Auditing 195 5.7 Summary 196 6.0 Change Management 199 6.1 Why Managing Change is Important 199 6.2 When to Change? 201 6.3 What is Impacted by Change? 205 6.4 Change Management and Internal Controls 209 6.5 Change Management as a Process 214 6.5.1 The Touhill Change Management Process 215 6.5.2 Following the Process 216 6.5.3 Have a Plan B, Plan C, and maybe a Plan D 220 6.6 Best Practices in Change Management 220 6.7 Summary 224 7.0 Personnel Management 227 7.1 Finding the Right Fit 227 7.2 Creating the Team 229 7.2.1 Picking the Right Leaders 230 7.2.2 Your Cybersecurity Leaders 233 7.3 Establishing Performance Standards 237 7.4 Organizational Considerations 240 7.5 Training for Success 242 7.5.1 Information Every Employee Ought to Know 242 7.5.2 Special Training for Executives 246 7.6 Special Considerations for Critical Infrastructure Protection 249 7.7 Summary 258 8.0 Performance Measures 261 8.1 Why Measure? 261 8.2 What to Measure? 267 8.2.1 Business Drivers 267 8.2.2 Types of Metrics 271 8.3 Metrics and the C-Suite 272 8.3.1 Considerations for the C-Suite 273 8.3.2 Questions about Cybersecurity Executives Should Ask 275 8.4 The Executive Cybersecurity Dashboard 277 8.4.1 How Vulnerable Are We? 277 8.4.2 How Effective Are Our Systems and Processes? 282 8.4.3 Do We Have the Right People, Are They Properly Trained, and Are They Following Proper Procedures? 286 8.4.4 Am I Spending the Right Amount on Security? 287 8.4.5 How Do We Compare to Others? 288 8.4.6 Creating Your Executive Cybersecurity Dashboard 289 8.5 Summary 291 9.0 What To Do When You Get Hacked 293 9.1 Hackers Already Have You Under Surveillance 293 9.2 Things to do Before it’s Too Late: Preparing for the Hack 295 9.2.1 Back Up Your Information 296 9.2.2 Baseline and Define What is Normal 296 9.2.3 Protect Yourself with Insurance 297 9.2.4 Create Your Disaster Recovery and Business Continuity Plan 298 9.3 What to do When Bad Things Happen: Implementing Your Plan 299 9.3.1 Item 1: Don’t Panic 300 9.3.2 Item 2: Make Sure You’ve Been Hacked 301 9.3.3 Item 3: Gain Control 302 9.3.4 Item 4: Reset All Passwords 303 9.3.5 Item 5: Verify and Lock Down All Your External Links 304 9.3.6 Item 6: Update and Scan 305 9.3.7 Item 7: Assess the Damage 305 9.3.8 Item 8: Make Appropriate Notifications 307 9.3.9 Item 9: Find Out Why It Happened and Who Did It 309 9.3.10 Item 10: Adjust Your Defenses 310 9.4 Foot Stompers 310 9.4.1 The Importance of Public Relations 310 9.4.2 Working with Law Enforcement 315 9.4.3 Addressing Liability 317 9.4.4 Legal Issues to Keep an Eye On 318 9.5 Fool Me Once… 319 9.6 Summary 320 10.0 Boardroom Interactions 323 Appendix A: Policies 347 Appendix B: General Rules for Email Etiquette: Sample Training Handout 357 Glossary 361 Select Bibliography 371 Index 373

About the Author :
Gregory J. Touhill, CISSP, is a Cybersecurity and Information Technology consultant, academic and author with nearly 30 years of experience creating, sustaining, and defending information technology solutions that are effective, efficient, and secure.  An experienced CIO and certified professional director, his team was awarded the 2012 Rowlett Award by the National Security Agency.  An adjunct professor at Washington University in St. Louis’ College of Engineering and Applied Science graduate programs in Cybersecurity and Information Management, he is engaged in several research projects with industry and academic partners, focusing on Cybersecurity issues.  C. Joseph Touhill is a successful CEO, board member, and senior executive.  He is highly experienced in creating and managing companies, both large and small.  He has been a corporate officer for 41 years, 29 years of which he has been a CEO.  Additionally, he has had extensive board and high-level committee experience.


Best Sellers


Product Details
  • ISBN-13: 9781118908815
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: Wiley-AIChE
  • Language: English
  • Sub Title: A Practical Guide
  • ISBN-10: 1118908813
  • Publisher Date: 03 Jun 2014
  • Binding: Digital (delivered electronically)
  • No of Pages: 416


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Cybersecurity for Executives: A Practical Guide
John Wiley & Sons Inc -
Cybersecurity for Executives: A Practical Guide
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Cybersecurity for Executives: A Practical Guide

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!