Cargando…

Cybersecurity and Decision Makers Data Security and Digital Trust.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: De éminville, Marie
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Newark : John Wiley & Sons, Incorporated, 2020.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Cover
  • Half-Title Page
  • Title Page
  • Copyright Page
  • Contents
  • Foreword
  • Preface
  • Introduction: Financial and Cyber Performance
  • 1. An Increasingly Vulnerable World
  • 1.1. The context
  • 1.1.1. Technological disruptions and globalization
  • 1.1.2. Data at the heart of industrial productivity
  • 1.1.3. Cyberspace, an area without boundaries
  • 1.1.4. IT resources
  • 1.2. Cybercrime
  • 1.2.1. The concept of cybercrime
  • 1.2.2. Five types of threats
  • 1.2.3. Five types of attackers
  • 1.3. The cybersecurity market
  • 1.3.1. The size of the market and its evolution
  • 1.3.2. The market by sector of activity
  • 1.3.3. Types of purchases and investments
  • 1.3.4. Geographical distribution
  • 1.4. Cyber incidents
  • 1.4.1. The facts
  • 1.4.2. Testimonials versus silence
  • 1.4.3. Trends
  • 1.4.4. Examples
  • 1.5. Examples of particularly exposed sectors of activity
  • 1.5.1. Cinema
  • 1.5.2. Banks
  • 1.5.3. Health
  • 1.5.4. Tourism and business hotels
  • 1.5.5. Critical national infrastructure
  • 1.6. Responsibilities of officers and directors
  • 2. Corporate Governance and Digital Responsibility
  • 2.1. Corporate governance and stakeholders
  • 2.2. The shareholders
  • 2.2.1. Valuation of the company
  • 2.2.2. Cyber rating agencies
  • 2.2.3. Insider trading
  • 2.2.4. Activist shareholders
  • 2.2.5. The stock exchange authorities
  • 2.2.6. The annual report
  • 2.3. The board of directors
  • 2.3.1. The facts
  • 2.3.2. The four missions of the board of directors
  • 2.3.3. Civil and criminal liability
  • 2.3.4. The board of directors and cybersecurity
  • 2.3.5. The board of directors and data protection
  • 2.3.6. The statutory auditors
  • 2.3.7. The numerical responsibility of the board of directors
  • 2.4. Customers and suppliers
  • 2.5. Operational management
  • 2.5.1. The impacts of digital transformation
  • 2.5.2. The digital strategy
  • 2.5.3. The consequences of poor digital performance
  • 2.5.4. Cybersecurity
  • 2.5.5. Merger and acquisition transactions
  • 2.5.6. Governance and data protection, cybersecurity
  • 3. Risk Mapping
  • 3.1. Cyber-risks
  • 3.2. The context
  • 3.3. Vulnerabilities
  • 3.3.1. Fraud against the president
  • 3.3.2. Supplier fraud
  • 3.3.3. Other economic impacts
  • 3.4. Legal risks
  • 3.4.1. Class actions
  • 3.4.2. Sanctions by the CNIL and the ICO
  • 3.5. The objectives of risk mapping
  • 3.6. The different methods of risk analysis
  • 3.7. Risk assessment (identify)
  • 3.7.1. The main actors
  • 3.7.2. The steps
  • 3.8. Protecting
  • 3.9. Detecting
  • 3.10. Reacting
  • 3.11. Restoring
  • 3.12. Decentralized mapping
  • 3.12.1. The internal threat
  • 3.12.2. Industrial risks
  • 3.12.3. Suppliers, subcontractors and service providers
  • 3.12.4. Connected objects
  • 3.13. Insurance
  • 3.14. Non-compliance risks and ethics
  • 4. Regulations
  • 4.1. The context
  • 4.1.1. Complaints filed with the CNIL
  • 4.1.2. Vectaury
  • 4.1.3. Optical Center
  • 4.1.4. Dailymotion