Digital Defense

Thomas J Parenty

Physical

In Circulation

This work helps you protect and maximize your company's digital assets. Security is a critical concern for every company, organization, and institution, regardless of their size or activity. In this timely book, leading security and privacy expert, Thomas J. Parenty demystifies computer and network security for non-technical managers taking them beyond hackers, firewalls, and virus protection to outline a holistic approach to information security that promotes business growth.Drawing from more than twenty years of experience in the computer security and cryptography fields, Parenty introduces the "Trust Framework", a unique and straightforward approach to developing and implementing a corporate security process.

The Trust Framework is based on two core principles: every technology choice must be closely linked to a company's overall mission and specific business activities; and a company needs to show its partners and customers why they should have trust in their electronic business transactions. Parenty guides managers in clearly articulating their specific business requirements, selecting the appropriate security technologies, and building an organizational environment that promotes and nurtures trust.

What will you learn from this book

  1. Cyber Threat Landscape: Exploring the current state of cybersecurity threats, including malware, phishing, ransomware, data breaches, and other common cyberattacks.

  2. Risk Assessment and Management: Understanding the importance of risk assessment in cybersecurity and implementing strategies to manage and mitigate potential risks effectively.

  3. Security Best Practices: Providing actionable advice and best practices for individuals and organizations to enhance their digital security posture, such as strong password management, software updates, and encryption techniques.

  4. Cyber Hygiene: Emphasizing the significance of regular maintenance, updates, and proper cybersecurity practices as a form of "hygiene" for digital devices and networks.

  5. Awareness and Education: Stressing the need for continuous education and awareness among users to recognize and respond to cybersecurity threats effectively.

  6. Incident Response and Recovery: Outlining protocols and procedures for responding to cybersecurity incidents, including incident detection, containment, eradication, and recovery.

  7. Securing Networks and Infrastructure: Strategies and tools for securing networks, systems, and infrastructure against cyber threats, including firewalls, intrusion detection systems, and secure configurations.

  8. Privacy Concerns and Compliance: Addressing privacy concerns, regulatory requirements, and compliance standards relevant to cybersecurity, such as GDPR, HIPAA, or industry-specific regulations.

  9. Emerging Technologies and Trends: Discussing the impact of emerging technologies (like AI, IoT, and cloud computing) on cybersecurity and identifying potential risks and challenges.

  10. Crisis Communication and Management: Exploring effective communication and crisis management strategies during and after cybersecurity incidents to maintain trust and minimize damage.

Language English
ISBN-10 1-57851-779-6
No of pages 163
Font Size Medium
Book Publisher Harvard Business School Publishing
Published Date 08 Dec 2003

About Author

Author : Thomas J Parenty

2 Books

Related Books