Dave Chatterjee (University of Georgia)
Cybersecurity Readiness
A Holistic and High-Performance Approach
Dave Chatterjee (University of Georgia)
Cybersecurity Readiness
A Holistic and High-Performance Approach
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
With rapidly expanding attacks and evolving methods of attack, organizations are in a perpetual state of breach and must deal with this existential threat head-on. Cybersecurity Readiness is intended to help students and practitioners develop and enhance this capability, as individuals continue to be both the strongest and weakest links in a cyber defense system.
Andere Kunden interessierten sich auch für
- Brannon JonesCollege Readiness 10120,99 €
- Summer Big Fun Workbook Preschool Readiness15,99 €
- African American Students' Career and College Readiness166,99 €
- Lynn Maslen KertellMy First Bob Books - Pre-Reading Skills Box Set Phonics, Ages 3 and Up, Pre-K (Reading Readiness)20,99 €
- Sayed Hadi SadeghiSmart Campus E-Readiness123,99 €
- U S Army Physical Fitness SchoolArmy Physical Readiness Training23,99 €
- Miriam B. Tager (USA Westfield State University)Challenging the School Readiness Agenda in Early Childhood Education45,99 €
-
-
-
With rapidly expanding attacks and evolving methods of attack, organizations are in a perpetual state of breach and must deal with this existential threat head-on. Cybersecurity Readiness is intended to help students and practitioners develop and enhance this capability, as individuals continue to be both the strongest and weakest links in a cyber defense system.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: SAGE Publications Inc
- Seitenzahl: 338
- Erscheinungstermin: 25. Februar 2021
- Englisch
- Abmessung: 235mm x 157mm x 23mm
- Gewicht: 616g
- ISBN-13: 9781071837337
- ISBN-10: 1071837338
- Artikelnr.: 61144266
- Herstellerkennzeichnung
- Books on Demand GmbH
- In de Tarpen 42
- 22848 Norderstedt
- info@bod.de
- 040 53433511
- Verlag: SAGE Publications Inc
- Seitenzahl: 338
- Erscheinungstermin: 25. Februar 2021
- Englisch
- Abmessung: 235mm x 157mm x 23mm
- Gewicht: 616g
- ISBN-13: 9781071837337
- ISBN-10: 1071837338
- Artikelnr.: 61144266
- Herstellerkennzeichnung
- Books on Demand GmbH
- In de Tarpen 42
- 22848 Norderstedt
- info@bod.de
- 040 53433511
Dave Chatterjee, Ph.D. is Associate Professor in the Department of Management Information Systems at the Terry College of Business at the University of Georgia and a Visiting Professor at Duke's Pratt School of Engineering. Dr. Chatterjee's interest and expertise lie in the various facets of information technology management, with current focus on cybersecurity and enterprise digitization. His work has been published in prestigious outlets such as The Wall Street Journal, MIT Sloan Management Review, California Management Review, Business Horizons, MIS Quarterly, and the Journal of Management Information Systems. Dr. Chatterjee has taught at the graduate and undergraduate levels, including classes on: information systems leadership, information technology and strategy, business process management, and enterprise digitization trends and implications. He serves as Senior Editor on the Journal of Organizational Computing and Electronic Commerce. Dr. Chatterjee delivers talks around the world; moderates CXO panel discussions; conducts corporate training, workshops, and webinars; and provides consulting and advisory services. He has appeared on radio and TV interviews and is often quoted by news media on major technology-related developments. He has served on the corporate and community leadership board of a prestigious cybersecurity network of Chief Information Security Officers (CISOs) and on a CISO SWAT team. For more details please visit https://dchatte.com.
Preface
Foreword
Endorsements
Acknowledgments
About the Author
Chapter 1. Introduction: The Challenge of Cybersecurity
Chapter 2. The Cyberattack Epidemic
2.1 Expanding Hardware and Software Attack Surfaces
2.2 The Human Vulnerability Factor
2.3 Growing Attack Vectors
2.4 Nature and Extent of Impact
Chapter 3. Breach Incidents and Lessons Learned
3.1 The Capital One Breach That Exposed 100 Million Applicants and Customer
Information
3.2 British Airways Ordered to Pay a Record Fine of $230 Million
3.3 Target Retail Chain Experiences an External Intrusion That Compromised
Millions of Customers' Data
3.4 Adult Friend Finder Site Breach Exposes Millions of Customer Records
3.5 Three Billion Yahoo User Accounts Compromised
3.6 Equifax Data Breach Exposes Millions of Customers' Data
3.7 Adobe Breach Exposes 38 Million Customer Records
3.8 Anthem Breach Affects 78.8 Million People
Chapter 4. Foundations of the High-Performance Information Security Culture
Framework
4.1 Organizational Culture and Firm Performance
4.2 Organizational Culture and Cybersecurity
4.3 High-Reliability Organizational Culture Traits
Chapter 5. Commitment
5.1 Hands-On Top Management
5.2 "We-Are-in-It-Together" Culture
5.3 Cross-Functional Participation
5.4 Sustainable Budget
5.5 Strategic Alignment and Partnerships
5.6 Joint Ownership and Accountability
5.7 Empowerment
Chapter 6. Preparedness
6.1 Identify
6.2 Protect
6.3 Detect
6.4 Respond and Recover
Chapter 7. Discipline
7.1 Information Security Governance Policy
7.2 Communications and Enforcement of Policies
7.3 Continuous Monitoring
7.4 Continuous Performance Assessment and Improvement
7.5 Security Audits and Drills
7.6 Penetration Testing and Red Team Exercises
Chapter 8. Key Messages and Actionable Recommendations
8.1 Commitment
8.2 Preparedness
8.3 Discipline
Appendix 1 Information Security Monitoring Controls
Appendix 2 Cybersecurity Performance Measures
Appendix 3A Cybersecurity Readiness Scorecard: Commitment
Appendix 3B Cybersecurity Readiness Scorecard: Preparedness
Appendix 3C Cybersecurity Readiness Scorecard: Discipline
Appendix 4 Cybersecurity and Privacy Laws and Regulations
Appendix 5 Physical, Technical, and Administrative Controls: A
Representative List
Appendix 6 Case Studies
Cybersecurity Resources
Index
Foreword
Endorsements
Acknowledgments
About the Author
Chapter 1. Introduction: The Challenge of Cybersecurity
Chapter 2. The Cyberattack Epidemic
2.1 Expanding Hardware and Software Attack Surfaces
2.2 The Human Vulnerability Factor
2.3 Growing Attack Vectors
2.4 Nature and Extent of Impact
Chapter 3. Breach Incidents and Lessons Learned
3.1 The Capital One Breach That Exposed 100 Million Applicants and Customer
Information
3.2 British Airways Ordered to Pay a Record Fine of $230 Million
3.3 Target Retail Chain Experiences an External Intrusion That Compromised
Millions of Customers' Data
3.4 Adult Friend Finder Site Breach Exposes Millions of Customer Records
3.5 Three Billion Yahoo User Accounts Compromised
3.6 Equifax Data Breach Exposes Millions of Customers' Data
3.7 Adobe Breach Exposes 38 Million Customer Records
3.8 Anthem Breach Affects 78.8 Million People
Chapter 4. Foundations of the High-Performance Information Security Culture
Framework
4.1 Organizational Culture and Firm Performance
4.2 Organizational Culture and Cybersecurity
4.3 High-Reliability Organizational Culture Traits
Chapter 5. Commitment
5.1 Hands-On Top Management
5.2 "We-Are-in-It-Together" Culture
5.3 Cross-Functional Participation
5.4 Sustainable Budget
5.5 Strategic Alignment and Partnerships
5.6 Joint Ownership and Accountability
5.7 Empowerment
Chapter 6. Preparedness
6.1 Identify
6.2 Protect
6.3 Detect
6.4 Respond and Recover
Chapter 7. Discipline
7.1 Information Security Governance Policy
7.2 Communications and Enforcement of Policies
7.3 Continuous Monitoring
7.4 Continuous Performance Assessment and Improvement
7.5 Security Audits and Drills
7.6 Penetration Testing and Red Team Exercises
Chapter 8. Key Messages and Actionable Recommendations
8.1 Commitment
8.2 Preparedness
8.3 Discipline
Appendix 1 Information Security Monitoring Controls
Appendix 2 Cybersecurity Performance Measures
Appendix 3A Cybersecurity Readiness Scorecard: Commitment
Appendix 3B Cybersecurity Readiness Scorecard: Preparedness
Appendix 3C Cybersecurity Readiness Scorecard: Discipline
Appendix 4 Cybersecurity and Privacy Laws and Regulations
Appendix 5 Physical, Technical, and Administrative Controls: A
Representative List
Appendix 6 Case Studies
Cybersecurity Resources
Index
Preface
Foreword
Endorsements
Acknowledgments
About the Author
Chapter 1. Introduction: The Challenge of Cybersecurity
Chapter 2. The Cyberattack Epidemic
2.1 Expanding Hardware and Software Attack Surfaces
2.2 The Human Vulnerability Factor
2.3 Growing Attack Vectors
2.4 Nature and Extent of Impact
Chapter 3. Breach Incidents and Lessons Learned
3.1 The Capital One Breach That Exposed 100 Million Applicants and Customer
Information
3.2 British Airways Ordered to Pay a Record Fine of $230 Million
3.3 Target Retail Chain Experiences an External Intrusion That Compromised
Millions of Customers' Data
3.4 Adult Friend Finder Site Breach Exposes Millions of Customer Records
3.5 Three Billion Yahoo User Accounts Compromised
3.6 Equifax Data Breach Exposes Millions of Customers' Data
3.7 Adobe Breach Exposes 38 Million Customer Records
3.8 Anthem Breach Affects 78.8 Million People
Chapter 4. Foundations of the High-Performance Information Security Culture
Framework
4.1 Organizational Culture and Firm Performance
4.2 Organizational Culture and Cybersecurity
4.3 High-Reliability Organizational Culture Traits
Chapter 5. Commitment
5.1 Hands-On Top Management
5.2 "We-Are-in-It-Together" Culture
5.3 Cross-Functional Participation
5.4 Sustainable Budget
5.5 Strategic Alignment and Partnerships
5.6 Joint Ownership and Accountability
5.7 Empowerment
Chapter 6. Preparedness
6.1 Identify
6.2 Protect
6.3 Detect
6.4 Respond and Recover
Chapter 7. Discipline
7.1 Information Security Governance Policy
7.2 Communications and Enforcement of Policies
7.3 Continuous Monitoring
7.4 Continuous Performance Assessment and Improvement
7.5 Security Audits and Drills
7.6 Penetration Testing and Red Team Exercises
Chapter 8. Key Messages and Actionable Recommendations
8.1 Commitment
8.2 Preparedness
8.3 Discipline
Appendix 1 Information Security Monitoring Controls
Appendix 2 Cybersecurity Performance Measures
Appendix 3A Cybersecurity Readiness Scorecard: Commitment
Appendix 3B Cybersecurity Readiness Scorecard: Preparedness
Appendix 3C Cybersecurity Readiness Scorecard: Discipline
Appendix 4 Cybersecurity and Privacy Laws and Regulations
Appendix 5 Physical, Technical, and Administrative Controls: A
Representative List
Appendix 6 Case Studies
Cybersecurity Resources
Index
Foreword
Endorsements
Acknowledgments
About the Author
Chapter 1. Introduction: The Challenge of Cybersecurity
Chapter 2. The Cyberattack Epidemic
2.1 Expanding Hardware and Software Attack Surfaces
2.2 The Human Vulnerability Factor
2.3 Growing Attack Vectors
2.4 Nature and Extent of Impact
Chapter 3. Breach Incidents and Lessons Learned
3.1 The Capital One Breach That Exposed 100 Million Applicants and Customer
Information
3.2 British Airways Ordered to Pay a Record Fine of $230 Million
3.3 Target Retail Chain Experiences an External Intrusion That Compromised
Millions of Customers' Data
3.4 Adult Friend Finder Site Breach Exposes Millions of Customer Records
3.5 Three Billion Yahoo User Accounts Compromised
3.6 Equifax Data Breach Exposes Millions of Customers' Data
3.7 Adobe Breach Exposes 38 Million Customer Records
3.8 Anthem Breach Affects 78.8 Million People
Chapter 4. Foundations of the High-Performance Information Security Culture
Framework
4.1 Organizational Culture and Firm Performance
4.2 Organizational Culture and Cybersecurity
4.3 High-Reliability Organizational Culture Traits
Chapter 5. Commitment
5.1 Hands-On Top Management
5.2 "We-Are-in-It-Together" Culture
5.3 Cross-Functional Participation
5.4 Sustainable Budget
5.5 Strategic Alignment and Partnerships
5.6 Joint Ownership and Accountability
5.7 Empowerment
Chapter 6. Preparedness
6.1 Identify
6.2 Protect
6.3 Detect
6.4 Respond and Recover
Chapter 7. Discipline
7.1 Information Security Governance Policy
7.2 Communications and Enforcement of Policies
7.3 Continuous Monitoring
7.4 Continuous Performance Assessment and Improvement
7.5 Security Audits and Drills
7.6 Penetration Testing and Red Team Exercises
Chapter 8. Key Messages and Actionable Recommendations
8.1 Commitment
8.2 Preparedness
8.3 Discipline
Appendix 1 Information Security Monitoring Controls
Appendix 2 Cybersecurity Performance Measures
Appendix 3A Cybersecurity Readiness Scorecard: Commitment
Appendix 3B Cybersecurity Readiness Scorecard: Preparedness
Appendix 3C Cybersecurity Readiness Scorecard: Discipline
Appendix 4 Cybersecurity and Privacy Laws and Regulations
Appendix 5 Physical, Technical, and Administrative Controls: A
Representative List
Appendix 6 Case Studies
Cybersecurity Resources
Index