How Businesses Can Plan, Build and Manage Safe Spaces in the Digital Age
Buch, Englisch, 231 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 429 g
ISBN: 978-3-030-13529-4
Verlag: Springer International Publishing
This book is a means to diagnose, anticipate and address new cyber risks and vulnerabilities while building a secure digital environment inside and around businesses. It empowers decision makers to apply a human-centred vision and a behavioral approach to cyber security problems in order to detect risks and effectively communicate them.
The authors bring together leading experts in the field to build a step-by-step toolkit on how to embed human values into the design of safe human-cyber spaces in the new digital economy. They artfully translate cutting-edge behavioral science and artificial intelligence research into practical insights for business.
As well as providing executives, risk assessment analysts and practitioners with practical guidance on navigating cyber risks within their organizations, this book will help policy makers better understand the complexity of business decision-making in the digital age.
Step by step, Pogrebna and Skilton showyou how to anticipate and diagnose new threats to your business from advanced and AI-driven cyber-attacks.
Zielgruppe
Professional/practitioner
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Computerkriminalität & Hacking
- Wirtschaftswissenschaften Betriebswirtschaft Management Risikomanagement
- Mathematik | Informatik EDV | Informatik Angewandte Informatik Wirtschaftsinformatik
- Wirtschaftswissenschaften Betriebswirtschaft Wirtschaftsinformatik, SAP, IT-Management
- Wirtschaftswissenschaften Betriebswirtschaft Management Forschung & Entwicklung (F&E), Innovation
Weitere Infos & Material
Introduction.- Cybersecurity Threats: Past and Present.- A Sneak-Peak into Motivation of a Cybercriminal.- Wake Up: You are the Target!.- Existing Solutions Summary.-Cybersecurity Business Goals and Stories Around Them.- Communication, Communication, Communication.- Future Threats.- Future Solutions.- Social and Ethical Aspects.- The Next-Generation Cybersecurity.- PLAN to Respond and Contain Threats.- How do we BUILD Solutions?.- How to MANAGE Threats?.- In Place of a Conclusion.