Buy Cybersecurity and Decision Makers by Marie de Fréminville
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology > Computer security > Data encryption > Cybersecurity and Decision Makers: Data Security and Digital Trust
Cybersecurity and Decision Makers: Data Security and Digital Trust

Cybersecurity and Decision Makers: Data Security and Digital Trust


     0     
5
4
3
2
1



International Edition


X
About the Book

Cyber security is a key issue affecting the confidence of Internet users and the sustainability of businesses. It is also a national issue with regards to economic development and resilience. As a concern, cyber risks are not only in the hands of IT security managers, but of everyone, and non-executive directors and managing directors may be held to account in relation to shareholders, customers, suppliers, employees, banks and public authorities. The implementation of a cybersecurity system, including processes, devices and training, is essential to protect a company against theft of strategic and personal data, sabotage and fraud. Cybersecurity and Decision Makers presents a comprehensive overview of cybercrime and best practice to confidently adapt to the digital world; covering areas such as risk mapping, compliance with the General Data Protection Regulation, cyber culture, ethics and crisis management. It is intended for anyone concerned about the protection of their data, as well as decision makers in any organization.

Table of Contents:
Foreword xi Preface xiii Introduction xvii Chapter 1. An Increasingly Vulnerable World 1 1.1. The context 1 1.1.1. Technological disruptions and globalization 1 1.1.2. Data at the heart of industrial productivity 3 1.1.3. Cyberspace, an area without boundaries 3 1.1.4. IT resources 4 1.2. Cybercrime 4 1.2.1. The concept of cybercrime 4 1.2.2. Five types of threats 6 1.2.3. Five types of attackers 9 1.3. The cybersecurity market 15 1.3.1. The size of the market and its evolution 15 1.3.2. The market by sector of activity 15 1.3.3. Types of purchases and investments 16 1.3.4. Geographical distribution 17 1.4. Cyber incidents 17 1.4.1. The facts 17 1.4.2. Testimonials versus silence 24 1.4.3. Trends 25 1.4.4. Examples 27 1.5. Examples of particularly exposed sectors of activity 30 1.5.1. Cinema 30 1.5.2. Banks 31 1.5.3. Health 34 1.5.4. Tourism and business hotels 35 1.5.5. Critical national infrastructure 36 1.6. Responsibilities of officers and directors 37 Chapter 2. Corporate Governance and Digital Responsibility 39 2.1. Corporate governance and stakeholders 39 2.2. The shareholders 40 2.2.1. Valuation of the company 41 2.2.2. Cyber rating agencies 42 2.2.3. Insider trading 43 2.2.4. Activist shareholders 44 2.2.5. The stock exchange authorities 45 2.2.6. The annual report 45 2.3. The board of directors47 2.3.1. The facts 47 2.3.2. The four missions of the board of directors. 47 2.3.3. Civil and criminal liability 49 2.3.4. The board of directors and cybersecurity 50 2.3.5. The board of directors and data protection 53 2.3.6. The statutory auditors 54 2.3.7. The numerical responsibility of the board of directors 55 2.4. Customers and suppliers 56 2.5. Operational management 58 2.5.1. The impacts of digital transformation 58 2.5.2. The digital strategy 59 2.5.3. The consequences of poor digital performance 62 2.5.4. Cybersecurity 63 2.5.5. Merger and acquisition transactions 65 2.5.6. Governance and data protection, cybersecurity 66 Chapter 3. Risk Mapping 69 3.1. Cyber-risks 69 3.2. The context 71 3.3. Vulnerabilities 72 3.3.1. Fraud against the president 73 3.3.2. Supplier fraud 73 3.3.3. Other economic impacts 74 3.4. Legal risks 76 3.4.1. Class actions 76 3.4.2. Sanctions by the CNIL and the ICO 77 3.5. The objectives of risk mapping 78 3.6. The different methods of risk analysis 79 3.7. Risk assessment (identify) 81 3.7.1. The main actors 81 3.7.2. The steps 82 3.8. Protecting 83 3.9. Detecting 83 3.10. Reacting 84 3.11. Restoring 85 3.12. Decentralized mapping 85 3.12.1. The internal threat 85 3.12.2. Industrial risks 87 3.12.3. Suppliers, subcontractors and service providers 88 3.12.4. Connected objects 89 3.13. Insurance 94 3.14. Non-compliance risks and ethics 96 Chapter 4. Regulations 99 4.1. The context 99 4.1.1. Complaints filed with the CNIL 100 4.1.2. Vectaury 101 4.1.3. Optical Center 102 4.1.4. Dailymotion 103 4.2. The different international regulations (data protection) 103 4.2.1. The United States 104 4.2.2. China 104 4.2.3. Asia 105 4.2.4. Europe 105 4.3. Cybersecurity regulations, the NIS Directive 105 4.4. Sectoral regulations 106 4.4.1. The banking industry 106 4.4.2. Health 108 4.5. The General Data Protection Regulation (GDPR) 109 4.5.1. The foundations 110 4.5.2. Definition of personal data 110 4.5.3. The so-called “sensitive” data 111 4.5.4. The principles of the GDPR 112 4.5.5. The five actions to be in compliance with the GDPR 113 4.5.6. The processing register 113 4.5.7. The five actions to be carried out 113 4.5.8. Cookies 116 4.6. Consequences for the company and the board of directors 117 Chapter 5. Best Practices of the Board of Directors 119 5.1. Digital skills 120 5.2. Situational awareness 121 5.2.1. The main issues 121 5.2.2. Insurance 125 5.3. Internal governance 126 5.3.1. The CISO 126 5.3.2. The CISO and the company 127 5.3.3. Clarifying responsibilities 131 5.3.4. Streamlining the supplier portfolio 133 5.3.5. Security policies and procedures 134 5.3.6. The human being 137 5.4. Data protection 138 5.4.1. Emails 139 5.4.2. The tools 141 5.4.3. Double authentication: better, but not 100% reliable 142 5.5. Choosing your service providers 142 5.6. The budget 143 5.7. Cyberculture 144 5.8. The dashboard for officers and directors 145 Chapter 6. Resilience and Crisis Management 147 6.1. How to ensure resilience? 147 6.2. Definition of a CERT 149 6.3. Definition of a SOC 149 6.4. The role of ENISA 150 6.5. The business continuity plan 150 6.6. Crisis management 151 6.6.1. The preparation 151 6.6.2. Exiting the state of sideration 152 6.6.3. Ensuring business continuity 153 6.6.4. Story of the TV5 Monde attack 154 6.6.5. Management of the first few hours 159 6.7. Crisis simulation 163 Conclusion. The Digital Committee 165 Appendices 167 Appendix 1. Cybersecurity Dashboard 169 Appendix 2. Ensuring Cybersecurity in Practice and on a Daily Basis 173 Appendix 3. Tools to Identify, Protect, Detect, Train, React and Restore 175 Glossary 179 References 183 Index 187

About the Author :
Marie de Fréminville is a non-executive director and founding partner of Starboard Advisory. She is also a member of the IFA (French Institute of non-executive Directors), HEC Governance and Swiss Association of Women Directors. In addition, de Fréminville is an expert in governance, financial performance, risk mapping and data protection.


Best Sellers


Product Details
  • ISBN-13: 9781786305190
  • Publisher: ISTE Ltd and John Wiley & Sons Inc
  • Publisher Imprint: ISTE Ltd and John Wiley & Sons Inc
  • Height: 234 mm
  • No of Pages: 224
  • Returnable: N
  • Sub Title: Data Security and Digital Trust
  • Width: 160 mm
  • ISBN-10: 1786305194
  • Publisher Date: 13 Mar 2020
  • Binding: Hardback
  • Language: English
  • Returnable: N
  • Spine Width: 18 mm
  • Weight: 454 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Cybersecurity and Decision Makers: Data Security and Digital Trust
ISTE Ltd and John Wiley & Sons Inc -
Cybersecurity and Decision Makers: Data Security and Digital Trust
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Cybersecurity and Decision Makers: Data Security and Digital Trust

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    Fresh on the Shelf


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!