Schweitzer Fachinformationen
Wenn es um professionelles Wissen geht, ist Schweitzer Fachinformationen wegweisend. Kunden aus Recht und Beratung sowie Unternehmen, öffentliche Verwaltungen und Bibliotheken erhalten komplette Lösungen zum Beschaffen, Verwalten und Nutzen von digitalen und gedruckten Medien.
This book delves into the critical realm of cyber security, specifically focusing on the ever-present threats that can cripple your organization. We will dissect real-world attacks methods and mitigation strategies, analyze industry and regulatory requirements as they impact your boardroom decisions, and expose the vulnerabilities that leave organizations susceptible to data breaches.
But why should cyber security be a top priority for CEOs, directors, and board members? A successful cyber-attack can be catastrophic. Beyond financial losses, data breaches can erode customer trust, damage brand reputation, disrupt critical operations, and even lead to legal ramifications for the board and for directors, such as regulatory fines and lawsuits.
This book empowers you to make informed decisions for your organization regarding cyber risk. We will equip you to not only understand the evolving threat landscape and the potential impact of an attack, but also to proactively reduce and mitigate those risks. This knowledge will ensure you fulfill your reporting obligations and demonstrate strong corporate governance in the face of ever-present cyber threats.
The digital age presents immense opportunities, but it also demands a heightened awareness of cyber security risks. This book is your roadmap to navigating this complex landscape, understanding your obligations as a director or board member, and ensuring your organization remains secure and thrives in this increasingly digital world.
What You Will Learn:
Who This Book is for:
Boards, directors, and management who have a responsibility over cyber security and ensuring cyber resilience for their organization.
Dan Weis is the Penetration Testing Practice Lead at Nexon Asia Pacific. Dan has over 30 years' experience in I.T, in a range of different industries, and was one of the first 10 people in the world to become a Certified Ethical Hacker.
Dan also has over 18.5+ years of Penetration Testing and Red Team experience with attributed 0day vulnerabilities in SCADA/Control Systems software. Dan heads up Nexon's team of Cyber Security Experts, leading Red and Blue Teams on Offensive and Defensive Cyber Operations to proactively assess company and government networks to increase their security posture and not become the next "headline".
Earning the nickname "The General" as a result of his multitude of industry qualifications, Daniel also holds an additional 22 industry certifications. In his spare time Daniel undertakes research on the cybercrime underground, facilitates training sessions for budding ethical hackers, is a regular on the speaker circuit presenting on all things Infosec & Dark web, and has presented at over 80 conferences and events over the last 5 years.
Dan also has appearances on Television and Radio and has a number of published resources including books, magazine articles, newspaper appearances, online posts and YouTube videos, and is an active participant in a variety of renowned security and industry programs. Dan has authored the book "Hack Proof Yourself! The essential guide to securing your digital world," and co-authored the book Learn Social Engineering that has received BookAuthority's best books of all time award.
Part 1: Understanding the Cyber Security Landscape: Threats, Roles, Governance and Frameworks.- Chapter 1: The Evolving Threat Landscape: Understanding Cyber Threats in the Digital Age.- Chapter 2: Understanding the Who and Why.- Chapter 3: Director Responsibilities and Obligations.- Chapter 4: Common Cyber Governance Principles & Standards.- Chapter 5: Cybersecurity Frameworks.- Part 2: Overseeing Cyber risk: Requirements, Attack Vectors and Mitigation Controls.- Chapter 6: How They Work Together.- Chapter 7: Understanding Cyber Risk and Cyber Resilience.- Chapter 8: We've had an Incident.- Chapter 9: Understanding Penetration Testing Reports and Compliance Audits.
Dateiformat: PDFKopierschutz: Wasserzeichen-DRM (Digital Rights Management)
Systemvoraussetzungen:
Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein „weicher” Kopierschutz verwendet. Daher ist technisch zwar alles möglich – sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.
Weitere Informationen finden Sie in unserer E-Book Hilfe.