Home Page Icon
Home Page
Table of Contents for
Title Page
Close
Title Page
by MacDonnell Ulsch
Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks
Cover
Additional praise for Cyber Threat! How to Manage the Growing Risk of Cyber Attacks
Title Page
Copyright
Dedication
Foreword
Preface
Acknowledgments
Introduction: What Every Current and Future Senior Executive Must Know about the Cyber Threat: A Perfect Digital Storm Is Forming
Part I: The Cyber Threat to the Corporate Brand
Chapter 1: The Rise of Cyber Organized Crime and Its Global Impact
Is Nothing Sacred?
The Liberty Reserve Case: Money Laundering in the Digital Age
The Corruption Factor
Information Threat, Physical Threat
Chapter 2: The Emergence of the Cyber Nation-State and Technology Espionage
A Case of Cyber Espionage Conspiracy?
According to the Select Committee…
Chapter 3: Cyber Al Qaeda Poses a Threat to Critical Infrastructure
A Disabled America
A New Age: Inspiring Terrorists and Terrorism
A Call Heard Vaguely
Attack Upon Attack, No Peace in Sight
Part II: Corporate Vulnerabilities in the Digital Society
Chapter 4: What Is the True Cost of a Cyber Attack?
Cyber Attack Detection Sometimes Takes Years
One of the First Questions: “How Much Will This Cost?”
A Few Common Cost Factors
What About Unreported Breaches?
Cyber Attacks Result in a Wider Impact: The Community
Chapter 5: U.S. Cyber Public Policy
No Guarantees with this Executive Order
Government-Industry Cooperation: No Silver Bullet
The Challenge of Defining Cyber Public Policy
Cold War II: The Cyber Chapter
Is There a Silver Lining in an Attack?
Chapter 6: Four Trends Driving Cyber Breaches and Increasing Corporate Risk
Technology Trend
Loss of Situational Awareness: Distraction
Culture
Technology is a Double-Edged Sword
Chapter 7: Social Media and Digital Protest
Social Media: A Tool for Disruption, a Model for Change
The Hacker Group Anonymous
Anarchaos: In the Image of Anonymous
Part III: Protecting the Brand
Chapter 8: Managing the Brand When the Worst Occurs
Be Prepared
Chapter 9: Managing the Big Risk
Background Investigation Suggestions to Improve Process
Risk-Reinforced Service Level Agreements
Clouds Fill the Horizon
Chapter 10: Creating Executive Cyber Risk Councils
The Goal of the Executive Cyber Risk Council
Who Should be Included in the Executive Risk Council?
Chapter 11: Early Warnings
Technical Signals Are There—But You've Got to Look
Know Who's Inside the Enterprise
What a Web we Weave… When Surfing
About the Author
Index
End User License Agreement
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Cyber Threat!
Next
Next Chapter
Copyright
Cyber Threat!
How to Manage the Growing Risk of Cyber Attacks
N. Macdonnell Ulsch
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset