Digital Resilience: Is Your Company Ready for the Next Cyber Threat?In the Digital Age of the twenty-first century, the question is not if you will be targeted, but when. For an enterprise to be fully prepared for the immanent attack, it must be actively monitoring networks, taking proactive steps to understand and contain attacks, enabling continued operation during an incident, and have a full recovery plan already in place. Are you prepared? If not, where does one begin?Cybersecurity expert Ray Rothrock has provided for businesses large and small a must-have resource that highlights the tactics used by today’s hackers, vulnerabilities lurking in networks, and strategies not just for surviving attacks, but actually thriving while under assault. Businesses and individuals will understand better the threats they face, be able to identify and address weaknesses, and respond to exploits swiftly and effectively.From data theft to downed servers, from malware to human error, cyber events can be triggered anytime from anywhere around the globe. Digital Resilience provides the resilience-building strategies your business needs to prevail--no matter what strikes. |
What people are saying - Write a review
We haven't found any reviews in the usual places.
Contents
1 | |
2 HARD TO BREAK ResilienceA Winning Strategy in a Losing War | 27 |
3 THE NATURE OF NETWORKS KnowledgeThe First Step Toward Digital Resilience | 49 |
4 DIGITALLY BOUND Getting the CSuite and Board Up to Speed on Digital Resilience | 83 |
5 PORTRAIT AND LANDSCAPE Achieving Resilience in Our Fragile Digital Environment | 109 |
6 THE MEASURE OF RESILIENCE Assessing and Improving Your Digital Resilience | 137 |
7 RESILIENT RESPONSE Making Resilience a WholeBusiness WholeNation WholeWorld Issue | 167 |
Other editions - View all
Digital Resilience: Is Your Company Ready for the Next Cyber Threat? Ray A. Rothrock No preview available - 2018 |
Common terms and phrases
Action Item ARPANET banks botnet C-suite cable called CISO cloud communication companies company’s complex computer networks connected corporate create credit card customers cyber cyberattack Cybercrime cybersecurity cyberspace data assets data breach devices digital business digital networks digital resilience digital security disruption ecosystem enable enterprise environment Estonia executives firewall glass cockpit global hackers hacking human Ibid ience impact infrastructure instability interconnected Internet of Things IP Address issue Joshua Cooper Ramo layer leadership malware ment messages million Morris worm National Net Neutrality network security nodes operating organization packet password percent phishing physical policies prioritization Ramo reported resilience score risk router servers spear phishing strategy Target breach Target Corporation TCP/IP TCP/IP model telephone threats tion today’s transformation Trillions users vendors vulnerabilities websites whole-business WikiLeaks wires Yahoo