Cybersecurity and Decision Makers Data Security and Digital Trust.
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Newark :
John Wiley & Sons, Incorporated,
2020.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Cover
- Half-Title Page
- Title Page
- Copyright Page
- Contents
- Foreword
- Preface
- Introduction: Financial and Cyber Performance
- 1. An Increasingly Vulnerable World
- 1.1. The context
- 1.1.1. Technological disruptions and globalization
- 1.1.2. Data at the heart of industrial productivity
- 1.1.3. Cyberspace, an area without boundaries
- 1.1.4. IT resources
- 1.2. Cybercrime
- 1.2.1. The concept of cybercrime
- 1.2.2. Five types of threats
- 1.2.3. Five types of attackers
- 1.3. The cybersecurity market
- 1.3.1. The size of the market and its evolution
- 1.3.2. The market by sector of activity
- 1.3.3. Types of purchases and investments
- 1.3.4. Geographical distribution
- 1.4. Cyber incidents
- 1.4.1. The facts
- 1.4.2. Testimonials versus silence
- 1.4.3. Trends
- 1.4.4. Examples
- 1.5. Examples of particularly exposed sectors of activity
- 1.5.1. Cinema
- 1.5.2. Banks
- 1.5.3. Health
- 1.5.4. Tourism and business hotels
- 1.5.5. Critical national infrastructure
- 1.6. Responsibilities of officers and directors
- 2. Corporate Governance and Digital Responsibility
- 2.1. Corporate governance and stakeholders
- 2.2. The shareholders
- 2.2.1. Valuation of the company
- 2.2.2. Cyber rating agencies
- 2.2.3. Insider trading
- 2.2.4. Activist shareholders
- 2.2.5. The stock exchange authorities
- 2.2.6. The annual report
- 2.3. The board of directors
- 2.3.1. The facts
- 2.3.2. The four missions of the board of directors
- 2.3.3. Civil and criminal liability
- 2.3.4. The board of directors and cybersecurity
- 2.3.5. The board of directors and data protection
- 2.3.6. The statutory auditors
- 2.3.7. The numerical responsibility of the board of directors
- 2.4. Customers and suppliers
- 2.5. Operational management
- 2.5.1. The impacts of digital transformation
- 2.5.2. The digital strategy
- 2.5.3. The consequences of poor digital performance
- 2.5.4. Cybersecurity
- 2.5.5. Merger and acquisition transactions
- 2.5.6. Governance and data protection, cybersecurity
- 3. Risk Mapping
- 3.1. Cyber-risks
- 3.2. The context
- 3.3. Vulnerabilities
- 3.3.1. Fraud against the president
- 3.3.2. Supplier fraud
- 3.3.3. Other economic impacts
- 3.4. Legal risks
- 3.4.1. Class actions
- 3.4.2. Sanctions by the CNIL and the ICO
- 3.5. The objectives of risk mapping
- 3.6. The different methods of risk analysis
- 3.7. Risk assessment (identify)
- 3.7.1. The main actors
- 3.7.2. The steps
- 3.8. Protecting
- 3.9. Detecting
- 3.10. Reacting
- 3.11. Restoring
- 3.12. Decentralized mapping
- 3.12.1. The internal threat
- 3.12.2. Industrial risks
- 3.12.3. Suppliers, subcontractors and service providers
- 3.12.4. Connected objects
- 3.13. Insurance
- 3.14. Non-compliance risks and ethics
- 4. Regulations
- 4.1. The context
- 4.1.1. Complaints filed with the CNIL
- 4.1.2. Vectaury
- 4.1.3. Optical Center
- 4.1.4. Dailymotion