You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Learn how to build a proactive cybersecurity culture together with the rest of your C-suite to effectively manage cyber risks Key FeaturesEnable business acceleration by preparing your organization against cyber risksDiscover tips and tricks to manage cyber risks in your organization and build a cyber resilient businessUnpack critical questions for the C-suite to ensure the firm is intentionally building cyber resilienceBook Description With cyberattacks on the rise, it has become essential for C-suite executives and board members to step up and collectively recognize cyber risk as a top priority business risk. However, non-cyber executives find it challenging to understand their role in inc...
In today's global economy, the importance of third-party relationships in the supply chain cannot be overstated. Suppliers, partners, vendors, and service providers are essential to the success of businesses across all industries. However, with this reliance on third parties comes significant risks that can quickly spiral out of control, leading to disastrous consequences. In "Supply Chain Roulette," we explore the critical role of third-party relationships and provide practical strategies for managing these risks effectively. Our comprehensive guide draws on real-world examples and case studies to illustrate the devastating consequences of overlooking supply chain risks, such as reputationa...
If the past few years have taught us anything, it is that the only thing we can predict about the future is: It is unpredictable. How do businesses — in particular smaller companies — ready themselves for this future?This general management book serves as an introductory reading for academics, practitioners, and graduate (MBA) students interested in understanding future readiness and the significance of small and medium-sized enterprises (SMEs) in driving the global economy and sustainability agenda. Covering topics like societal impact, technology, change management, talent, and leadership, this book highlights unique strategies for SMEs to be more future-ready. Featuring case studies o...
Welcome to Better, Simpler Cyber: A Business-Based Guide to Cyber Risk Management! In these challenging times, businesses need to find ways to stay ahead of their competition, and improving their cybersecurity posture is one of the most effective ways to do so. However, blindly investing in expensive cybersecurity tools and solutions is not always the answer. What businesses need is the right approach and people in place to manage their cyber risks effectively. This book is designed to help you understand how to manage cyber risk in a way that supports your business goals and objectives. It covers the entire cyber risk management process, including identifying your exposure to cyber risks, a...
THE FUTRE IS OURS When humans first evolved, we were basically indistinguishable from animals. Then we harnessed the power of fire, and it catapulted us beyond a state of animalism. Since then, human innovation has propelled us from one technological revolution to the next. We are now at the next world-altering wave of technological evolution: artificial intelligence. But the current AI offerings cannot fulfill our fundamental desire to communicate with our technology through speech. We didn't evolve to type or use a mouse; we evolved to have conversations, including with our technology. We want the USS Enterprise shipboard computer, J.A.R.V.I.S. from Iron Man, the interface from Her. But we...
An easy to use guide written by experienced practitioners for recently-hired or promoted Chief Information Security Offices (CISOs), individuals aspiring to become a CISO, as well as business and technical professionals interested in the topic of cybersecurity, including Chief Technology Officers (CTOs), Chief Information Officers (CIOs), Boards of Directors, Chief Privacy Officers, and other executives responsible for information protection.As a desk reference guide written specifically for CISOs, we hope this book becomes a trusted resource for you, your teams, and your colleagues in the C-suite. The different perspectives can be used as standalone refreshers and the five immediate next steps for each chapter give the reader a robust set of 45 actions based on roughly 100 years of relevant experience that will help you strengthen your cybersecurity programs.
With millions lost each year, cyber crime has evolved from a minor nuisance to a major concern involving well-organized actors and highly sophisticated organizations. Arguably one of the most important challenges of the 21st century, with millions lost each year, cyber crime has evolved from a minor nuisance to a major concern involving well-organized actors and highly sophisticated organizations. This volume explores the state of threats present in the cyber fraud underground. It discusses phishing/pharming, trojans/toolkits, direct threats, and pump-and-dump scams. By examining the operations of the cyber criminal, the book provides perspective into the general incentives, risks, and behavioral patterns of the fraudsters. Armed with this information, organizations and individuals are better able to develop countermeasures and crafting tactics to disrupt the fraud underground and secure their systems.
This volume examines core areas of development in security, emphasizing the pivotal contributions of women to the field’s evolution. The author first covers a broad spectrum of key topics, including how security is created, where innovation occurs, what the underpinnings are, and who supports it and how. After an overview of the field, female security professionals share their own stories of technology and innovation in security today; the foundation, where research is headed, and the emerging trends. Women currently make up a very small pocket of cyber security staffing – this book aims to increase the visibility of women in the field and their contributions and encourage other females to join the field. The contributors hold various roles from executive leadership, to engineers, analysts, and researchers.
"Imagine trying to play defense in football without ever studying offense. You would not know when a run was coming, how to defend pass patterns, nor when to blitz. In computer systems, as in football, a defender must be able to think like an attacker. I say it in my class every semester, you don't want to be the last person to attack your own system--you should be the first. "The world is quickly going online. While I caution against online voting, it is clear that online gaming is taking the Internet by storm. In our new age where virtual items carry real dollar value, and fortunes are won and lost over items that do not really exist, the new threats to the intrepid gamer are all too real....