Index

  • Abdullah, Bilal
  • Advanced manufacturing technology and materials, China and
  • Advanced persistent threats (APTs), China and
  • Agricultural technology, China and
  • Ahmed, Kafeel
  • Al-Assad, Bashar Hafez
  • Alexander, Keith B.
  • Alliance management, executive risk council and
  • Al Qaeda
  • Anarchaos (hacker group)
  • Anonymous (hacker group)
  • Attorneys. See Legal issues
  • Australia
  • Automation technology, China and
  • Axis of cyber evil
  • Background investigations, of third parties and insiders
  • Banks, profiled by hackers through social media
  • Billy Jack (film)
  • Bin Laden, Osama,. See also Al Qaeda
  • Biotechnology, China and
  • Black Ice: The Invisible Threat of Cyber-Terrorism (Verton)
  • Boards of directors:
    • cyber threats as issue for
    • outdated IT technology and security issues
    • physical threats to executives and
  • Boston Marathon bombing
  • Buffett, Warren
  • Burns, Stephen
  • Business continuity planning, executive risk council and
  • California
  • Canada
  • Chain of custody requirements, data breach investigation and
  • Chief financial officer (CFO)
  • Chief information officer (CIO)
  • Chief information security officer (CISO)
  • Chief privacy officer (CPO)
  • Chief risk officer (CRO)
  • Chief security officer (CSO)
  • Chief technology officer (CTO)
  • Child pornography, transnational organized crime and
  • China
    • advanced persistent threats and
    • axis of cyber evil and rerouting of cyber attacks
    • encryption sold to
    • framework for cyber espionage
    • key technologies sought by
    • money laundering and
    • strategy and goals of cyber espionage
    • threats to U.S. telecommunications network
    • use of authorized and unauthorized IP addresses
  • China Telecom Corporation Limited
  • Churchill, Winston
  • Cloud computing, third-party vendors and
  • Coelho, Paulo
  • “Cold War II”:
    • lack of cyber threat visibility and
    • lack of fear of major event
  • Committee on Foreign Investment in the United States (CFIUS)
  • Community, costs of cyber breaches to
  • Comoros
  • Cooley, Mason
  • Corporate communications:
    • data breach investigation and
    • executive risk council and
  • Costa Rica
  • Costs, of cyber attacks
    • blame and
    • common factors in
    • costs to community in lost jobs and tax revenues
    • estimates of
    • importance of attack prevention
    • reporting issues
    • vulnerability and lack of detection due to outdated IT systems
  • Cultural trends, in cyber breaches
  • Cyber breach investigation, preparing for
    • forensic evidence capture phase
    • initiation phase
    • reporting to constituents phase,
    • risk impact analysis phase
    • third-party vendors and
    • web and behavioral analytics phase
  • Cyber Intelligence Sharing and Protection Act (H.R. 624)
  • Cyber threats, generally
    • factors in “perfect storm” of
    • as issue for board of directors
    • mobile devices and
    • as more than technical security issues
    • security's failure to keep pace with Internet's evolution and growth
  • Cyprus
  • Czech Republic
  • DARPA (Defense Advanced Research Projects Agency)
  • Denial-of-service attacks
  • Denmark
  • Detection, costs of breaches and delay in
  • Determan, Lothar
  • Disaster recovery, executive risk council and
  • Distributed denial-of-service attacks (DDoS)
  • Dubuc, Benjamin
  • Economic trends, in cyber breaches
  • Electric grid, and danger from terrorism
  • Employees. See Insiders
  • Encryption:
    • data breach investigation and
    • organized crime and
    • U.S. sale of encryption technology to China
  • Energy technology, China and
  • Enforcement, of risk-reinforced service level agreements
  • Environment technology, China and
  • Esseghaier, Chiheb
  • Executive Order 13636, Improving Critical Infrastructure Cybersecurity
  • Executive report, data breach investigation and
  • Executive risk councils
    • composition of
    • goals of
    • need for
  • Executive sponsors
  • Extortion
  • Federal Deposit Insurance Corporation (FDIC), third-party due diligence and
  • Federal Emergency Management Agency (FEMA), reported attacks on
  • Federal Information Security Management Act (FISMA)
  • Feinstein, Dianne
  • Filipiak, Tomas
  • Financial Crimes Enforcement Network (FinCEN), of U.S. Treasury Department
  • Financial Services Modernization Act (1999)
  • Finland
  • Ford, Henry
  • Foreign corrupt practices management
  • Forensic evidence, data breach investigation and
  • Generally Accepted Privacy Principles (GAPP), third parties and information privacy
  • Geopolitical trends, in cyber breaches
  • Germany
  • Giblin, Ellen
  • Glasgow International Airport bombing
  • Government. See Public policy
  • Graham, John B.
  • Gramm-Leach-Bliley Act (1999)
  • Guyana
  • Health care data
  • Health Insurance Portability and Accountability Act (HIPAA), Omnibus Final Rule of
  • Hidden Lynx
  • Honduras
  • Hong Kong
  • Huawei USA
  • Hughes, Steven G.
  • Human resources department
  • Hyundai Merchant Marine Co. Ltd.
  • Industrial Control Systems Computer Emergency Response Team (ICS-CERT)
  • Information privacy and security:
    • executive risk council and
    • risk-reinforced service level agreements and
  • Insiders:
    • background investigations of
    • cyber defense and
    • disclosure of data breaches by
    • threats from
  • Inspire magazine
  • Internal audit department
  • International Standards Organization (ISO) 27000 security standard
  • Internet protocol (IP) addresses:
    • authorized and unauthorized (toxic)
    • data breach investigation and
  • Internet service providers (ISPs), warning signs of threats and
  • Iran
  • Japan
  • Jaser, Raed
  • Jobs, Steve
  • Kaspersky Lab
  • Kazakhstan
  • Kenya
  • Laptops. See Mobile devices
  • Latvia
  • Law enforcement, costs of attacks and
  • Legal issues:
    • data breach investigation and,
    • establishing attorney-client privilege
    • executive risk council and
  • Liberty Reserve, S.A.
  • London Stock Exchange bombing
  • Low Orbit Ion Cannon (LOIC)
  • Malaysia
  • Manning, Bradley
  • Marketing, executive risk council and
  • Marston, David
  • Massachusetts
  • Master service agreement, risk-reinforced service level agreements and
  • McCaskill, Claire
  • Media, warning signs of threats
  • Miller, Danny
  • Mobile devices, risks and threats to
  • Money laundering, organized crime and,. See also Liberty Reserve, S.A.
  • Moore, Gordon E.
  • Morocco
  • Motion Picture Association of America (MPAA)
  • Mozy
  • NASA, risk management and
  • National Cybersecurity and Communications Integration Center
  • National Development and Reform Commission (NDRC), of China
  • National Institute of Standards and Technology Act
  • National Institute of Standards Technology (NIST)
  • National Nuclear Security Administration, reported cyber attacks on
  • National Security Act of 1947, Title XI
  • Nation-state espionage. See China
  • New Zealand
  • Nigeria
  • North Korea:
    • axis of cyber evil and
    • espionage against South Korea
    • nuclear program of
  • Obama, Barack
  • Office of the National Counterintelligence Executive
  • Omnibus Final rule, of Health Insurance Portability and Accountability Act
  • Operation Payback, of Anonymous
  • Organized crime. See Transnational organized crime (TOC)
  • Pacific Electric & Gas Corporation
  • Paine, Thomas
  • Payment Card Industry Data Security Standard (PCI DSS)
  • Pearl Harbor Dot Com (Schwartau)
  • Phishing
  • Physical threats, to executives
  • Ponemon Institute
  • Portman, Rob
  • Preparedness. See Cyber breach investigation, preparing for
  • Presidential Policy Directive (PPD)
  • Private sector, cooperation with government
    • legal restraints on sharing of information
  • Project 863, of China
  • Public policy
    • “Cold War II” and
    • elements of cyber threats and
    • Executive Order 13636
    • government and private sector cooperation
    • inadequate preparedness and
    • legal restraints on sharing of information
    • organizations responsible for cyber defense
    • possibility of grave events
  • Reactionary vulnerability remediation
  • Regulations, about security:
    • data breach investigation and
    • executive risk council and
    • inadequacy of
    • low levels of compliance with
    • management and
  • Reporting issues
    • data breach investigation and constituents
    • data breach investigation and legal requirements
    • unreported breaches and
  • Republic of China. See China
  • Resource technology, China and
  • Risk impact analysis, data breach investigation and
  • Risk-reinforced service level agreements (RRSLAs)
    • enforcement and
    • foreign corrupt practices management and
    • information privacy and security and
    • internal audit and
    • master service agreement and
    • regulatory and industry compliance and
    • threat and risk analysis and
    • vendor accountability executive and
  • Rogers, Mike
  • Ruppersberger, Dutch
  • Russia:
    • advanced persistent threats and
    • axis of cyber evil and
    • money laundering and
    • transnational organized crime and
  • Sales, executive risk council and
  • Schwartau, Winn
  • Secret Service, Cyber Intelligence Section of
  • Security officer, executive risk council and
  • Sejong Institute
  • Select Committee on Intelligence, of U.S. House of Representatives
  • September 11, 2001 attacks
  • Service level agreements, with third parties,. See also Risk-reinforced service level agreements
  • Sherwood, Robert E.
  • Singapore
  • Snowden, Edward
  • Social media
    • Anarchaos and
    • Anonymous and
    • protests and risks
    • transnational organized crime and
  • South Korea
  • Spain
  • Spear-phishing
  • Steinert, Timothy
  • Stratfor
  • Sullivan, Mark J.
  • Surfing of web, risks and
  • Switzerland
  • Symantec Corporation
  • Syria
  • Tablets. See Mobile devices
  • Taiwan
  • Target Corporation data breach
  • Technology trends, in cyber breaches
  • Telecommunications supply chain, threats to
  • Terrorist groups
    • al Qaeda's use of Internet for recruiting
    • basic weapons of
    • dangers to electric grid
    • internal threats from double lives of terrorists
    • reality of threats from
    • vital importance of investing in infrastructure defense
  • Tester, Jon
  • Third parties, managing risks from
    • background investigations
    • cloud computing and
    • difficulties of
    • executive risk council and
    • FDIC's due diligence and
    • reporting of breaches and
    • risk-reinforced service level agreements and
  • Threat! Managing Risk in a Hostile World (Ahmed)
  • TJX data breach
  • Tor (The Onion Router)
  • Transnational organized crime (TOC)
    • crimes of
    • encryption and
    • physical threats to executives and
    • reactionary vulnerability remediation and
    • theft of corporate intellectual property and
  • Transparency International
  • Trends, in cyber breaches
    • cultural
    • economic
    • geopolitical
    • technological
  • Ukraine
  • United Kingdom
  • United Nations Office on Drugs and Crime (UNODC)
  • Unreported security breaches
  • U.S. Computer Emergency Readiness Team (US-CERT)
  • U.S. Navy
  • USA Patriot Act
  • Utah
  • Warning signs
    • employee and vendor backgrounds
    • experience and
    • Internet service providers and
    • IP addresses and
    • media and
    • risks of ignoring
    • web surfing
  • Web analytics, data breach investigation and
  • Whistleblower programs, of third-party vendors
  • WikiLeaks
  • ZTE, Chinese espionage and
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
13.59.237.58