Cybersecurity for executives [electronic resource] : a practical guide / by Gregory J. Touhill and C. Joseph Touhill.

This guide can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business. It emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues; covers what to do...

Full description

Saved in:
Bibliographic Details
Online Access: Law Students, Faculty, and Staff (via Bloomberg Law)
Main Authors: Touhill, Gregory J. (Author), Touhill, C. J., 1938- (Author)
Other title:Bloomberg Law online
Bloomberg Law online.
Format: Electronic eBook
Language:English
Published: Hoboken, New Jersey : John Wiley and Sons, [2014]
Subjects:

MARC

LEADER 00000cam a2200000 i 4500
001 in00000002581
006 m o d
007 cr |||||||||||
008 140415s2014 nju ob 001 0 eng
005 20231101210119.3
010 |a  2014015182 
019 |a 882610202  |a 893436806  |a 900003714  |a 961588044  |a 962646351 
020 |a 9781118908808  |q (epub) 
020 |a 1118908805  |q (epub) 
020 |a 9781118908815  |q (pdf) 
020 |a 1118908813  |q (pdf) 
020 |z 9781118888148  |q (cloth) 
020 |z 9781118908785 
020 |z 1118908783 
020 |z 1306906458 
020 |z 9781306906456 
020 |z 1118888146 
029 1 |a AU@  |b 000052777481 
029 1 |a CHBIS  |b 010259706 
029 1 |a CHBIS  |b 010413347 
029 1 |a CHNEW  |b 000943012 
029 1 |a CHVBK  |b 33311311X 
029 1 |a CHVBK  |b 480254168 
029 1 |a DEBBG  |b BV042182837 
029 1 |a DEBBG  |b BV043396690 
029 1 |a DEBBG  |b BV043610174 
029 1 |a DEBSZ  |b 409827983 
029 1 |a DEBSZ  |b 417235267 
029 1 |a DEBSZ  |b 420034722 
029 1 |a DEBSZ  |b 449433226 
029 1 |a DEBSZ  |b 485047535 
029 1 |a DKDLA  |b 820120-katalog:999942697205765 
029 1 |a NZ1  |b 15592109 
029 1 |a NZ1  |b 15906896 
035 |a (OCoLC)blw876900980 
035 |a (OCoLC)876900980  |z (OCoLC)882610202  |z (OCoLC)893436806  |z (OCoLC)900003714  |z (OCoLC)961588044  |z (OCoLC)962646351 
037 |a E024C110-C148-46F5-8C15-3D328778880C  |b OverDrive, Inc.  |n http://www.overdrive.com 
040 |a DLC  |b eng  |e rda  |e pn  |c DLC  |d YDX  |d N$T  |d EBLCP  |d DG1  |d E7B  |d TEFOD  |d CUS  |d IDEBK  |d YDXCP  |d DEBSZ  |d COO  |d OCLCF  |d UMI  |d DEBBG  |d OCLCO  |d TEFOD  |d STF  |d B24X7  |d OCLCQ  |d VT2  |d CSJ  |d D6H  |d CNNOR  |d DG1  |d CCO  |d LIP  |d PIFBY  |d ZCU  |d LIV  |d MERUC  |d OCLCQ  |d U3W  |d UCO  |d OCLCQ  |d CEF  |d ICG  |d INT  |d OCLCQ  |d G3B  |d TKN  |d OCLCQ  |d UAB  |d ORZ  |d DKC  |d OCLCQ  |d BRF  |d OCLCO  |d OCLCQ 
042 |a pcc 
049 |a UCXA 
050 0 0 |a TK5105.59 
072 7 |a BUS  |x 082000  |2 bisacsh 
072 7 |a BUS  |x 041000  |2 bisacsh 
072 7 |a BUS  |x 042000  |2 bisacsh 
072 7 |a BUS  |x 085000  |2 bisacsh 
082 0 0 |a 658.4/78  |2 23 
100 1 |a Touhill, Gregory J.,  |e author.  |0 http://id.loc.gov/authorities/names/no2008053438  |1 http://isni.org/isni/0000000384989495 
245 1 0 |a Cybersecurity for executives  |h [electronic resource] :  |b a practical guide /  |c by Gregory J. Touhill and C. Joseph Touhill. 
264 1 |a Hoboken, New Jersey :  |b John Wiley and Sons,  |c [2014] 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file  |2 rda 
590 |a Promoted: Local to Global Cooperative  |b Bloomberg Law Complete 
504 |a Includes bibliographical references and index. 
588 0 |a Online resource; title from digital title page (viewed on February 20, 2019). 
520 |a This guide can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business. It emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues; covers what to do when you get hacked, including business continuity and disaster recovery planning, public relations, legal and regulatory issues, and notifications and disclosures; provides steps for integrating cybersecurity into strategy, policy and guidelines, change management and personnel management; identifies cybersecurity best practices that executives can and should use both in the office and at home to protect their vital information. --  |c Edited summary from book. 
505 0 |a Cybersecurity for Executives: A Practical Guide; Contents ; Foreword ; Preface ; Acknowledgments ; 1.0 INTRODUCTION ; 1.1 DEFINING CYBERSECURITY; 1.2 CYBERSECURITY IS A BUSINESS IMPERATIVE; 1.3 CYBERSECURITY IS AN EXECUTIVE-LEVEL CONCERN; 1.4 QUESTIONS TO ASK; 1.5 VIEWS OF OTHERS; 1.6 CYBERSECURITY IS A FULL-TIME ACTIVITY; 2.0 WHY BE CONCERNED? ; 2.1 A CLASSIC HACK; 2.2 WHO WANTS YOUR FORTUNE?; 2.3 NATION-STATE THREATS; 2.3.1 China; 2.3.2 Don't Think that China is the Only One; 2.4 CYBERCRIME IS BIG BUSINESS; 2.4.1 Mercenary Hackers; 2.4.2 Hacktivists; 2.4.3 The Insider Threat. 
505 8 |a 2.4.4 Substandard Products and Services; 2.5 SUMMARY; 3.0 MANAGING RISK ; 3.1 WHO OWNS RISK IN YOUR BUSINESS?; 3.2 WHAT ARE YOUR RISKS?; 3.2.1 Threats to Your Intellectual Property and Trade Secrets; 3.2.2 Technical Risks; 3.2.3 Human Risks; 3.3 CALCULATING YOUR RISK; 3.3.1 Quantitative Risk Assessment; 3.3.2 Qualitative Risk Assessment; 3.3.3 Risk Decisions; 3.4 COMMUNICATING RISK; 3.4.1 Communicating Risk Internally; 3.4.2 Regulatory Communications; 3.4.3 Communicating with Shareholders; 3.5 ORGANIZING FOR SUCCESS; 3.5.1 Risk Management Committee; 3.5.2 Chief Risk Officers; 3.6 SUMMARY. 
505 8 |a 4.0 BUILD YOUR STRATEGY 4.1 HOW MUCH "CYBERSECURITY" DO I NEED?; 4.2 THE MECHANICS OF BUILDING YOUR STRATEGY; 4.2.1 Where are We Now?; 4.2.2 What do We have to Work with?; 4.2.3 Where do We Want to be?; 4.2.4 How do We Get There?; 4.2.5 Goals and Objectives; 4.3 AVOIDING STRATEGY FAILURE; 4.3.1 Poor Plans, Poor Execution; 4.3.2 Lack of Communication; 4.3.3 Resistance to Change; 4.3.4 Lack of Leadership and Oversight; 4.4 WAYS TO INCORPORATE CYBERSECURITY INTO YOUR STRATEGY; 4.4.1 Identify the Information Critical to Your Business; 4.4.2 Make Cybersecurity Part of Your Culture. 
505 8 |a 4.4.3 Consider Cybersecurity Impacts in Your Decisions; 4.4.4 Measure Your Progress; 4.5 PLAN FOR SUCCESS; 4.6 SUMMARY; 5.0 Plan for Success ; 5.1 TURNING VISION INTO REALITY; 5.1.1 Planning for Excellence; 5.1.2 A Plan of Action; 5.1.3 Doing Things ; 5.2 POLICIES COMPLEMENT PLANS; 5.2.1 Great Cybersecurity Policies for Everyone; 5.2.2 Be Clear about Your Policies and Who Owns Them; 5.3 PROCEDURES IMPLEMENT PLANS; 5.4 EXERCISE YOUR PLANS; 5.5 LEGAL COMPLIANCE CONCERNS; 5.6 AUDITING; 5.7 SUMMARY; 6.0 CHANGE MANAGEMENT ; 6.1 WHY MANAGING CHANGE IS IMPORTANT; 6.2 WHEN TO CHANGE? 
505 8 |a 6.3 WHAT IS IMPACTED BY CHANGE?6.4 CHANGE MANAGEMENT AND INTERNAL CONTROLS; 6.5 CHANGE MANAGEMENT AS A PROCESS; 6.5.1 The Touhill Change Management Process; 6.5.2 Following the Process; 6.5.3 Have a Plan B, Plan C, and maybe a Plan D; 6.6 BEST PRACTICES IN CHANGE MANAGEMENT; 6.7 SUMMARY; 7.0 PERSONNEL MANAGEMENT ; 7.1 FINDING THE RIGHT FIT; 7.2 CREATING THE TEAM; 7.2.1 Picking the Right Leaders; 7.2.2 Your Cybersecurity Leaders; 7.3 ESTABLISHING PERFORMANCE STANDARDS; 7.4 ORGANIZATIONAL CONSIDERATIONS; 7.5 TRAINING FOR SUCCESS; 7.5.1 Information Every Employee Ought to Know. 
650 0 |a Computer networks  |x Security measures.  |0 http://id.loc.gov/authorities/subjects/sh94001277 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
730 0 |a Bloomberg Law online 
730 0 |a Bloomberg Law online. 
700 1 |a Touhill, C. J.,  |d 1938-  |e author.  |0 http://id.loc.gov/authorities/names/n82060291  |1 http://isni.org/isni/0000000078807788 
776 0 8 |i Print version:  |a Touhill, Gregory J.  |t Cybersecurity for executives.  |d Hoboken, New Jersey : Wiley, [2014]  |z 9781118888148  |w (DLC) 2014002691  |w (OCoLC)876900683 
856 4 0 |u https://www.bloomberglaw.com/browser/105.525368  |z Law Students, Faculty, and Staff (via Bloomberg Law) 
938 |a Books 24x7  |b B247  |n bks00072721 
938 |a EBL - Ebook Library  |b EBLB  |n EBL1707094 
938 |a ebrary  |b EBRY  |n ebr10879737 
938 |a EBSCOhost  |b EBSC  |n 792115 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis28553940 
938 |a YBP Library Services  |b YANK  |n 11605720 
938 |a YBP Library Services  |b YANK  |n 12673621 
938 |a YBP Library Services  |b YANK  |n 11858484 
944 |a MARS - RDA ENRICHED 
994 |a 92  |b UCX 
999 f f |s ed134a0f-f9ef-4fcb-8338-ccfc9e2e46e0  |i c93d479c-7ba1-40a8-a36a-66bbeb3bd7f8 
952 f f |p Can circulate  |a University of Colorado Boulder  |b Online  |c Online  |d Law - Electronic Resources  |h Library of Congress classification  |i web  |n 1