Buch, Englisch, 224 Seiten, Format (B × H): 157 mm x 235 mm, Gewicht: 487 g
Reihe: Wiley Corporate F&A
Buch, Englisch, 224 Seiten, Format (B × H): 157 mm x 235 mm, Gewicht: 487 g
Reihe: Wiley Corporate F&A
ISBN: 978-1-118-83635-4
Verlag: WILEY
Conquering cyber attacks requires a multi-sector, multi-modal approach
Cyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks facing all facets of government and industry, and the various factors that must align to maintain information integrity. Written by one of the nation's most highly respected cyber risk analysts, the book describes how businesses and government agencies must protect their most valuable assets to avoid potentially catastrophic consequences. Much more than just cyber security, the necessary solutions require government and industry to work cooperatively and intelligently. This resource reveals the extent of the problem, and provides a plan to change course and better manage and protect critical information.
Recent news surrounding cyber hacking operations show how intellectual property theft is now a matter of national security, as well as economic and commercial security. Consequences are far-reaching, and can have enormous effects on national economies and international relations. Aggressive cyber forces in China, Russia, Eastern Europe and elsewhere, the rise of global organized criminal networks, and inattention to vulnerabilities throughout critical infrastructures converge to represent an abundantly clear threat. Managing the threat and keeping information safe is now a top priority for global businesses and government agencies. Cyber Threat! breaks the issue down into real terms, and proposes an approach to effective defense. Topics include:
* The information at risk
* The true extent of the threat
* The potential consequences across sectors
* The multifaceted approach to defense
The growing cyber threat is fundamentally changing the nation's economic, diplomatic, military, and intelligence operations, and will extend into future technological, scientific, and geopolitical influence. The only effective solution will be expansive and complex, encompassing every facet of government and industry. Cyber Threat! details the situation at hand, and provides the information that can help keep the nation safe.
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
Foreword xiii
Preface xv
Acknowledgments xvii
Introduction: What Every Current and Future Senior Executive Must Know about the Cyber Threat: A Perfect Digital Storm Is Forming 1
What Factors Create a Perfect Storm? 2
Increasingly Sophisticated Attacks 8
Mobile Devices at Higher Risk 9
Sometimes Security Just Doesn't Take Hold 9
It Wasn't Always Like This 10
Without a Bang 11
A Board Issue 12
The Cyber Frankenstein Cometh 13
Defining Success 14
Notes 15
PART I: THE CYBER THREAT TO THE CORPORATE BRAND: HOW IT WILL IMPACT YOUR COMPANY
Chapter 1: The Rise of Cyber Organized Crime and Its Global Impact 19
Is Nothing Sacred? 23
The Liberty Reserve Case: Money Laundering in the Digital Age 24
The Corruption Factor 27
Information Threat, Physical Threat 32
Notes 33
Chapter 2: The Emergence of the Cyber Nation-State and Technology Espionage: Red China Rising and Its Global Cyber Theft Strategy 35
A Case of Cyber Espionage Conspiracy? 43
According to the Select Committee. 54
Notes 55
Chapter 3: Cyber Al Qaeda Poses a Threat to Critical Infrastructure 57
A Disabled America 59
A New Age: Inspiring Terrorists and Terrorism 62
A Call Heard Vaguely 64
Attack upon Attack, No Peace in Sight 67
Notes 68
PART II: CORPORATE VULNERABILITIES IN THE DIGITAL SOCIETY: PREPARE TO DEFEND YOURSELF AND YOUR BRAND
Chapter 4: What Is the True Cost of a Cyber Attack? 71
Cyber Attack Detection Sometimes Takes Years 74
One of the First Questions: "How Much Will This Cost?" 76
A Few Common Cost Factors 77
What about Unreported Breaches? 78
Cyber Attacks Result in a Wider Impact: The Community 81
Notes 83
Chapter 5: U.S. Cyber Public Policy: Don't Rely on It to Protect the Brand 85
No Guarantees with This Executive Order 88
Government-Industry Cooperation: No Silver Bullet 91
The Challenge of Defining Cyber Public Policy 92
Cold War II: The Cyber Chapter 93
Is There a Silver Lining in an Attack? 97
Notes 102
Chapter 6: Four Trends Driving Cyber Breaches and Increasing Corporate Risk: Technological, Cultural, Economic, and Geopolitical Shifts 103
Technology Trend 104
Loss of Situational Awareness: Distraction 107
Culture 108
Technology Is a Double-Edged Sword 109
Notes 112
Chapter 7: Social Media and Digital Protest 113
Social Media: A Tool for Disruption, a Model for Change 116
The Hacker Group Anonymous 117
Anarchaos: In the Image of Anonymous 125
Notes 126
PART III: PROTECTING THE BRAND: ACTIONS EXECUTIVE MANAGEMENT MUST TAKE TO REDUCE CYBER RISK
Chapter 8: Managing the Brand When the Worst Occurs 129
Be Prepared 132
Chapter 9: Managing the Big Risk: Third-Party Vendors 145
Background Investigation Suggestions to Improve Process 149
Risk-Reinforced Service Level Agreements 154
Clouds Fill the Horizon 166
Notes 169
Chapter 10: Creating Executive Cyber Risk Councils 171
The Goal of the Executive Cyber Risk Council 175
Who Should Be Included in the Executive Risk Council? 176
Chapter 11: Early Warnings: Something Bad Is on the Way 185
Technical Signals Are There--But You've Got to Look 187
Know Who's Inside the Enterprise 190
What a Web We Weave. When Surfing 192
About the Author 197
Index 199




