Muutke küpsiste eelistusi

E-raamat: Cybersecurity and Decision Makers - Data Security and Digital Trust: Data Security and Digital Trust [Wiley Online]

(Starboard Advisory, France)
  • Formaat: 224 pages
  • Ilmumisaeg: 13-Mar-2020
  • Kirjastus: ISTE Ltd and John Wiley & Sons Inc
  • ISBN-10: 1119720362
  • ISBN-13: 9781119720362
  • Wiley Online
  • Hind: 174,45 €*
  • * hind, mis tagab piiramatu üheaegsete kasutajate arvuga ligipääsu piiramatuks ajaks
  • Formaat: 224 pages
  • Ilmumisaeg: 13-Mar-2020
  • Kirjastus: ISTE Ltd and John Wiley & Sons Inc
  • ISBN-10: 1119720362
  • ISBN-13: 9781119720362
Cyber security is a key issue affecting the confidence of Internet users and the sustainability of businesses. It is also a national issue with regards to economic development and resilience. As a concern, cyber risks are not only in the hands of IT security managers, but of everyone, and non-executive directors and managing directors may be held to account in relation to shareholders, customers, suppliers, employees, banks and public authorities. The implementation of a cybersecurity system, including processes, devices and training, is essential to protect a company against theft of strategic and personal data, sabotage and fraud. Cybersecurity and Decision Makers presents a comprehensive overview of cybercrime and best practice to confidently adapt to the digital world; covering areas such as risk mapping, compliance with the General Data Protection Regulation, cyber culture, ethics and crisis management. It is intended for anyone concerned about the protection of their data, as well as decision makers in any organization.
Foreword xi
Preface xiii
Introduction xvii
Chapter 1 An Increasingly Vulnerable World
1(38)
1.1 The context
1(3)
1.1.1 Technological disruptions and globalization
1(2)
1.1.2 Data at the heart of industrial productivity
3(1)
1.1.3 Cyberspace, an area without boundaries
3(1)
1.1.4 IT resources
4(1)
1.2 Cybercrime
4(11)
1.2.1 The concept of cybercrime
4(2)
1.2.2 Five types of threats
6(3)
1.2.3 Five types of attackers
9(6)
1.3 The cybersecurity market
15(2)
1.3.1 The size of the market and its evolution
15(1)
1.3.2 The market by sector of activity
15(1)
1.3.3 Types of purchases and investments
16(1)
1.3.4 Geographical distribution
17(1)
1.4 Cyber incidents
17(13)
1.4.1 The facts
17(7)
1.4.2 Testimonials versus silence
24(1)
1.4.3 Trends
25(2)
1.4.4 Examples
27(3)
1.5 Examples of particularly exposed sectors of activity
30(7)
1.5.1 Cinema
30(1)
1.5.2 Banks
31(3)
1.5.3 Health
34(1)
1.5.4 Tourism and business hotels
35(1)
1.5.5 Critical national infrastructure
36(1)
1.6 Responsibilities of officers and directors
37(2)
Chapter 2 Corporate Governance and Digital Responsibility
39(30)
2.1 Corporate governance and stakeholders
39(1)
2.2 The shareholders
40(7)
2.2.1 Valuation of the company
41(1)
2.2.2 Cyber rating agencies
42(1)
2.2.3 Insider trading
43(1)
2.2.4 Activist shareholders
44(1)
2.2.5 The stock exchange authorities
45(1)
2.2.6 The annual report
45(2)
2.3 The board of directors
47(9)
2.3.1 The facts
47(1)
2.3.2 The four missions of the board of directors
47(2)
2.3.3 Civil and criminal liability
49(1)
2.3.4 The board of directors and cybersecurity
50(3)
2.3.5 The board of directors and data protection
53(1)
2.3.6 The statutory auditors
54(1)
2.3.7 The numerical responsibility of the board of directors
55(1)
2.4 Customers and suppliers
56(2)
2.5 Operational management
58(11)
2.5.1 The impacts of digital transformation
58(1)
2.5.2 The digital strategy
59(3)
2.5.3 The consequences of poor digital performance
62(1)
2.5.4 Cybersecurity
63(2)
2.5.5 Merger and acquisition transactions
65(1)
2.5.6 Governance and data protection, cybersecurity
66(3)
Chapter 3 Risk Mapping
69(30)
3.1 Cyber-risks
69(2)
3.2 The context
71(1)
3.3 Vulnerabilities
72(4)
3.3.1 Fraud against the president
73(1)
3.3.2 Supplier fraud
73(1)
3.3.3 Other economic impacts
74(2)
3.4 Legal risks
76(2)
3.4.1 Class actions
76(1)
3.4.2 Sanctions by the CNIL and the ICO
77(1)
3.5 The objectives of risk mapping
78(1)
3.6 The different methods of risk analysis
79(2)
3.7 Risk assessment (identify)
81(2)
3.7.1 The main actors
81(1)
3.7.2 The steps
82(1)
3.8 Protecting
83(1)
3.9 Detecting
83(1)
3.10 Reacting
84(1)
3.11 Restoring
85(1)
3.12 Decentralized mapping
85(9)
3.12.1 The internal threat
85(2)
3.12.2 Industrial risks
87(1)
3.12.3 Suppliers, subcontractors and service providers
88(1)
3.12.4 Connected objects
89(5)
3.13 Insurance
94(2)
3.14 Non-compliance risks and ethics
96(3)
Chapter 4 Regulations
99(20)
4.1 The context
99(4)
4.1.1 Complaints filed with the CNIL
100(1)
4.1.2 Vectaury
101(1)
4.1.3 Optical Center
102(1)
4.1.4 Dailymotion
103(1)
4.2 The different international regulations (data protection)
103(2)
4.2.1 The United States
104(1)
4.2.2 China
104(1)
4.2.3 Asia
105(1)
4.2.4 Europe
105(1)
4.3 Cybersecurity regulations, the NIS Directive
105(1)
4.4 Sectoral regulations
106(3)
4.4.1 The banking industry
106(2)
4.4.2 Health
108(1)
4.5 The General Data Protection Regulation (GDPR)
109(8)
4.5.1 The foundations
110(1)
4.5.2 Definition of personal data
110(1)
4.5.3 The so-called "sensitive" data
111(1)
4.5.4 The principles of the GDPR
112(1)
4.5.5 The five actions to be in compliance with the GDPR
113(1)
4.5.6 The processing register
113(1)
4.5.7 The five actions to be carried out
113(3)
4.5.8 Cookies
116(1)
4.6 Consequences for the company and the board of directors
117(2)
Chapter 5 Best Practices of the Board of Directors
119(28)
5.1 Digital skills
120(1)
5.2 Situational awareness
121(5)
5.2.1 The main issues
121(4)
5.2.2 Insurance
125(1)
5.3 Internal governance
126(12)
5.3.1 The CISO
126(1)
5.3.2 The CISO and the company
127(4)
5.3.3 Clarifying responsibilities
131(2)
5.3.4 Streamlining the supplier portfolio
133(1)
5.3.5 Security policies and procedures
134(3)
5.3.6 The human being
137(1)
5.4 Data protection
138(4)
5.4.1 Emails
139(2)
5.4.2 The tools
141(1)
5.4.3 Double authentication: better, but not 100% reliable
142(1)
5.5 Choosing your service providers
142(1)
5.6 The budget
143(1)
5.7 Cyberculture
144(1)
5.8 The dashboard for officers and directors
145(2)
Chapter 6 Resilience and Crisis Management
147(18)
6.1 How to ensure resilience?
147(2)
6.2 Definition of a CERT
149(1)
6.3 Definition of a SOC
149(1)
6.4 The role of ENISA
150(1)
6.5 The business continuity plan
150(1)
6.6 Crisis management
151(12)
6.6.1 The preparation
151(1)
6.6.2 Exiting the state of sideration
152(1)
6.6.3 Ensuring business continuity
153(1)
6.6.4 Story of the TV5 Monde attack
154(5)
6.6.5 Management of the first few hours
159(4)
6.7 Crisis simulation
163(2)
Conclusion. The Digital Committee 165(2)
Appendices 167(2)
Appendix 1 Cybersecurity Dashboard 169(4)
Appendix 2 Ensuring Cybersecurity in Practice and on a Daily Basis 173(2)
Appendix 3 Tools to Identify, Protect, Detect, Train, React and Restore 175(4)
Glossary 179(4)
References 183(4)
Index 187
Marie de Fréminville is a non-executive director and founding partner of Starboard Advisory. She is also a member of the IFA (French Institute of non-executive Directors), HEC Governance and Swiss Association of Women Directors. In addition, de Fréminville is an expert in governance, financial performance, risk mapping and data protection.