Khulna University of Engineering & Technology
Central Library

Normal view MARC view ISBD view

Cybersecurity for executives : a practical guide / by Gregory J. Touhill and C. Joseph Touhill.

By: Touhill, Gregory J.
Contributor(s): Touhill, C. J, 1938-.
Material type: materialTypeLabelBookPublisher: Hoboken, New Jersey : John Wiley & Sons, [2014]Description: 1 online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9781118908808 (epub); 1118908805 (epub); 9781118908815 (pdf); 1118908813 (pdf).Subject(s): Computer networks -- Security measures | Computer networks -- Security measures | BUSINESS & ECONOMICS -- Industrial Management | BUSINESS & ECONOMICS -- Management | BUSINESS & ECONOMICS -- Management Science | BUSINESS & ECONOMICS -- Organizational Behavior | Computer networks -- Security measures | Computer networks / Security measuresGenre/Form: Electronic books. | Electronic books.Additional physical formats: Print version:: Cybersecurity for executivesDDC classification: 658.4/78 Online resources: Wiley Online Library
Contents:
Cybersecurity for Executives: A Practical Guide; Contents ; Foreword ; Preface ; Acknowledgments ; 1.0 INTRODUCTION ; 1.1 DEFINING CYBERSECURITY; 1.2 CYBERSECURITY IS A BUSINESS IMPERATIVE; 1.3 CYBERSECURITY IS AN EXECUTIVE-LEVEL CONCERN; 1.4 QUESTIONS TO ASK; 1.5 VIEWS OF OTHERS; 1.6 CYBERSECURITY IS A FULL-TIME ACTIVITY; 2.0 WHY BE CONCERNED? ; 2.1 A CLASSIC HACK; 2.2 WHO WANTS YOUR FORTUNE?; 2.3 NATION-STATE THREATS; 2.3.1 China; 2.3.2 Don't Think that China is the Only One; 2.4 CYBERCRIME IS BIG BUSINESS; 2.4.1 Mercenary Hackers; 2.4.2 Hacktivists; 2.4.3 The Insider Threat
2.4.4 Substandard Products and Services2.5 SUMMARY; 3.0 MANAGING RISK ; 3.1 WHO OWNS RISK IN YOUR BUSINESS?; 3.2 WHAT ARE YOUR RISKS?; 3.2.1 Threats to Your Intellectual Property and Trade Secrets; 3.2.2 Technical Risks; 3.2.3 Human Risks; 3.3 CALCULATING YOUR RISK; 3.3.1 Quantitative Risk Assessment; 3.3.2 Qualitative Risk Assessment; 3.3.3 Risk Decisions; 3.4 COMMUNICATING RISK; 3.4.1 Communicating Risk Internally; 3.4.2 Regulatory Communications; 3.4.3 Communicating with Shareholders; 3.5 ORGANIZING FOR SUCCESS; 3.5.1 Risk Management Committee; 3.5.2 Chief Risk Officers; 3.6 SUMMARY
4.0 BUILD YOUR STRATEGY 4.1 HOW MUCH "CYBERSECURITY" DO I NEED?; 4.2 THE MECHANICS OF BUILDING YOUR STRATEGY; 4.2.1 Where are We Now?; 4.2.2 What do We have to Work with?; 4.2.3 Where do We Want to be?; 4.2.4 How do We Get There?; 4.2.5 Goals and Objectives; 4.3 AVOIDING STRATEGY FAILURE; 4.3.1 Poor Plans, Poor Execution; 4.3.2 Lack of Communication; 4.3.3 Resistance to Change; 4.3.4 Lack of Leadership and Oversight; 4.4 WAYS TO INCORPORATE CYBERSECURITY INTO YOUR STRATEGY; 4.4.1 Identify the Information Critical to Your Business; 4.4.2 Make Cybersecurity Part of Your Culture
4.4.3 Consider Cybersecurity Impacts in Your Decisions4.4.4 Measure Your Progress; 4.5 PLAN FOR SUCCESS; 4.6 SUMMARY; 5.0 Plan for Success ; 5.1 TURNING VISION INTO REALITY; 5.1.1 Planning for Excellence; 5.1.2 A Plan of Action; 5.1.3 Doing Things ; 5.2 POLICIES COMPLEMENT PLANS; 5.2.1 Great Cybersecurity Policies for Everyone; 5.2.2 Be Clear about Your Policies and Who Owns Them; 5.3 PROCEDURES IMPLEMENT PLANS; 5.4 EXERCISE YOUR PLANS; 5.5 LEGAL COMPLIANCE CONCERNS; 5.6 AUDITING; 5.7 SUMMARY; 6.0 CHANGE MANAGEMENT ; 6.1 WHY MANAGING CHANGE IS IMPORTANT; 6.2 WHEN TO CHANGE?
6.3 WHAT IS IMPACTED BY CHANGE?6.4 CHANGE MANAGEMENT AND INTERNAL CONTROLS; 6.5 CHANGE MANAGEMENT AS A PROCESS; 6.5.1 The Touhill Change Management Process; 6.5.2 Following the Process; 6.5.3 Have a Plan B, Plan C, and maybe a Plan D; 6.6 BEST PRACTICES IN CHANGE MANAGEMENT; 6.7 SUMMARY; 7.0 PERSONNEL MANAGEMENT ; 7.1 FINDING THE RIGHT FIT; 7.2 CREATING THE TEAM; 7.2.1 Picking the Right Leaders; 7.2.2 Your Cybersecurity Leaders; 7.3 ESTABLISHING PERFORMANCE STANDARDS; 7.4 ORGANIZATIONAL CONSIDERATIONS; 7.5 TRAINING FOR SUCCESS; 7.5.1 Information Every Employee Ought to Know
Summary: This guide can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business. It emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues; covers what to do when you get hacked, including business continuity and disaster recovery planning, public relations, legal and regulatory issues, and notifications and disclosures; provides steps for integrating cybersecurity into strategy, policy and guidelines, change management and personnel management; identifies cybersecurity best practices that executives can and should use both in the office and at home to protect their vital information. -- Edited summary from book.
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

Includes bibliographical references and index.

Description based on print version record and CIP data provided by publisher.

This guide can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business. It emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues; covers what to do when you get hacked, including business continuity and disaster recovery planning, public relations, legal and regulatory issues, and notifications and disclosures; provides steps for integrating cybersecurity into strategy, policy and guidelines, change management and personnel management; identifies cybersecurity best practices that executives can and should use both in the office and at home to protect their vital information. -- Edited summary from book.

Cybersecurity for Executives: A Practical Guide; Contents ; Foreword ; Preface ; Acknowledgments ; 1.0 INTRODUCTION ; 1.1 DEFINING CYBERSECURITY; 1.2 CYBERSECURITY IS A BUSINESS IMPERATIVE; 1.3 CYBERSECURITY IS AN EXECUTIVE-LEVEL CONCERN; 1.4 QUESTIONS TO ASK; 1.5 VIEWS OF OTHERS; 1.6 CYBERSECURITY IS A FULL-TIME ACTIVITY; 2.0 WHY BE CONCERNED? ; 2.1 A CLASSIC HACK; 2.2 WHO WANTS YOUR FORTUNE?; 2.3 NATION-STATE THREATS; 2.3.1 China; 2.3.2 Don't Think that China is the Only One; 2.4 CYBERCRIME IS BIG BUSINESS; 2.4.1 Mercenary Hackers; 2.4.2 Hacktivists; 2.4.3 The Insider Threat

2.4.4 Substandard Products and Services2.5 SUMMARY; 3.0 MANAGING RISK ; 3.1 WHO OWNS RISK IN YOUR BUSINESS?; 3.2 WHAT ARE YOUR RISKS?; 3.2.1 Threats to Your Intellectual Property and Trade Secrets; 3.2.2 Technical Risks; 3.2.3 Human Risks; 3.3 CALCULATING YOUR RISK; 3.3.1 Quantitative Risk Assessment; 3.3.2 Qualitative Risk Assessment; 3.3.3 Risk Decisions; 3.4 COMMUNICATING RISK; 3.4.1 Communicating Risk Internally; 3.4.2 Regulatory Communications; 3.4.3 Communicating with Shareholders; 3.5 ORGANIZING FOR SUCCESS; 3.5.1 Risk Management Committee; 3.5.2 Chief Risk Officers; 3.6 SUMMARY

4.0 BUILD YOUR STRATEGY 4.1 HOW MUCH "CYBERSECURITY" DO I NEED?; 4.2 THE MECHANICS OF BUILDING YOUR STRATEGY; 4.2.1 Where are We Now?; 4.2.2 What do We have to Work with?; 4.2.3 Where do We Want to be?; 4.2.4 How do We Get There?; 4.2.5 Goals and Objectives; 4.3 AVOIDING STRATEGY FAILURE; 4.3.1 Poor Plans, Poor Execution; 4.3.2 Lack of Communication; 4.3.3 Resistance to Change; 4.3.4 Lack of Leadership and Oversight; 4.4 WAYS TO INCORPORATE CYBERSECURITY INTO YOUR STRATEGY; 4.4.1 Identify the Information Critical to Your Business; 4.4.2 Make Cybersecurity Part of Your Culture

4.4.3 Consider Cybersecurity Impacts in Your Decisions4.4.4 Measure Your Progress; 4.5 PLAN FOR SUCCESS; 4.6 SUMMARY; 5.0 Plan for Success ; 5.1 TURNING VISION INTO REALITY; 5.1.1 Planning for Excellence; 5.1.2 A Plan of Action; 5.1.3 Doing Things ; 5.2 POLICIES COMPLEMENT PLANS; 5.2.1 Great Cybersecurity Policies for Everyone; 5.2.2 Be Clear about Your Policies and Who Owns Them; 5.3 PROCEDURES IMPLEMENT PLANS; 5.4 EXERCISE YOUR PLANS; 5.5 LEGAL COMPLIANCE CONCERNS; 5.6 AUDITING; 5.7 SUMMARY; 6.0 CHANGE MANAGEMENT ; 6.1 WHY MANAGING CHANGE IS IMPORTANT; 6.2 WHEN TO CHANGE?

6.3 WHAT IS IMPACTED BY CHANGE?6.4 CHANGE MANAGEMENT AND INTERNAL CONTROLS; 6.5 CHANGE MANAGEMENT AS A PROCESS; 6.5.1 The Touhill Change Management Process; 6.5.2 Following the Process; 6.5.3 Have a Plan B, Plan C, and maybe a Plan D; 6.6 BEST PRACTICES IN CHANGE MANAGEMENT; 6.7 SUMMARY; 7.0 PERSONNEL MANAGEMENT ; 7.1 FINDING THE RIGHT FIT; 7.2 CREATING THE TEAM; 7.2.1 Picking the Right Leaders; 7.2.2 Your Cybersecurity Leaders; 7.3 ESTABLISHING PERFORMANCE STANDARDS; 7.4 ORGANIZATIONAL CONSIDERATIONS; 7.5 TRAINING FOR SUCCESS; 7.5.1 Information Every Employee Ought to Know

There are no comments for this item.

Log in to your account to post a comment.


Khulna University of Engineering & Technology
Funded by: HEQEP, UGC, Bangladesh