000 | 05151cam a2200361Ii 4500 | ||
---|---|---|---|
001 | on1111475093 | ||
003 | OCoLC | ||
005 | 20240726105214.0 | ||
008 | 190803s2019 xx o 000 0 eng d | ||
040 |
_aEBLCP _beng _epn _erda _cEBLCP _dYDX _dOCLCQ _dNT _dEBLCP _dOCLCF _dCNO |
||
020 |
_a9781633697881 _q((electronic)l(electronic)ctronic) |
||
050 | 0 | 4 |
_aQA76 _b.C934 2019 |
049 | _aMAIN | ||
245 | 1 | 0 |
_aCybersecurity : _bthe Insights You Need from Harvard Business Review. _c |
260 |
_aBoston, Massachusetts : _bHarvard Business Review Press, _c(c)2019. |
||
300 | _a1 online resource (xvi, 158 pages) | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_adata file _2rda |
||
490 | 1 | _aInsights you need from Harvard Business Review | |
504 | _a2 | ||
520 | 0 |
_aToo many of us associate cybersecurity with credit card theft and think the solution is for our banking partners, social media platforms, and large retailers to improve and increase their data security practices. But in the world we live and work in, where our systems are increasingly interconnected and our employees and customers are logging in to access their work or our products from all over the world and on all types of devices, the risk is much greater than we imagine. As the complexity and sophistication of our interconnected systems increases, so too do the skills of our adversaries. From outlining the challenges to exploring the solutions, Cybersecurity: The Insights You Need from Harvard Business Review will help leaders address the managerial, organizational, and strategic aspects of these ever-present threats to your organization. Catch up on current topics and deepen your understanding of them with the Insights You Need series from Harvard Business Review. Featuring some of HBR's best and most recent thinking, Insights You Need titles are both a primer on today's most pressing issues and an extension of the conversation, with interesting research, interviews, case studies, and practical ideas to help you explore how a particular issue will impact your company and what it will mean for you and your business.-- _cProvided by publisher. |
|
505 | 0 | 0 |
_aIntroduction / _rby Alex Blau -- _tInternet insecurity: if your mission-critical systems are digital and connected, they can never be made fully safe / _rby Andy Bochman -- _tSecurity trends by the numbers: the good news is that companies are stopping more attacks than ever -- _tyou can probably guess the bad news / _rby Scott Berinato and Matt Perry -- _tWhy boards aren't dealing with cyberthreats: because they're too busy focusing on areas they have expertise in, such as retaining talent and monitoring the regulatory environment / _rby J. Yo-Jud Cheng and Boris Groysberg -- _tThe behavioral economics of why executives underinvest in cybersecurity: leaders need to stop thinking about cybersecurity as a problem that can be solved / _rby Alex Blau -- _tWhy the entire c-suite needs to use the same metrics for cyber risk: but before that, leaders must create a common language around cybersecurity / _rby Jason J. Hogg -- _tThe best cybersecurity investment you can make is better training: your first and last line of defense is prepared leaders and employees / _rby Dante Disparte and Chris Furlow -- _tBetter cybersecurity starts with fixing your employees' bad habits: ways to neturalize predictably poor user behavior / _rby Alex Blau -- _tThe key to better cybersecurity: keep employee rules simple -- _tpeople look for workarounds when policies are too complicated / _rby Maarten Van Horenbeeck -- _tThe avoidable mistakes executives continue to make after a data breach: you will get hacked -- _there's what not to do when it happens / _rby Bill Bourdon -- _tActive defense and "hacking back": a primer -- _tpassive monitoring isn't your only choice / _rby Scott Berinato -- _tCybersecurity is putting customer trust at the center of competition: don't just protect customer data -- _tdemonstrate that you're doing everything in your power to minimize breaches / _rby Andrew Burt -- _tPrivacy and cybersecurity are converging: here's why that matters for people and for companies -- _tbig data and machine learning could kill the notion of consent / _rby Andrew Burt -- _tWhat countries and companies can do when trade and cybersecurity overlap: a framework for understanding and categorizing cybersecurity concerns involved in trade / _rby Stuart Madnick, Simon Johnson, and Keman Huang -- _tAI is the future of cybersecurity, for better and for worse: it will become both the problem and the solution / _rby Roman V. Yampolskiy. |
530 |
_a2 _ub |
||
650 | 0 | _aComputer security. | |
650 | 0 |
_aBusiness enterprises _xSecurity measures. |
|
655 | 1 | _aElectronic Books. | |
856 | 4 | 0 |
_uhttps://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2003607&site=eds-live&custid=s3260518 _zClick to access digital title | log in using your CIU ID number and my.ciu.edu password |
942 |
_cOB _D _eEB _hQA.. _m2019 _QOL _R _x _8NFIC _2LOC |
||
994 |
_a92 _bNT |
||
999 |
_c92536 _d92536 |
||
902 |
_a1 _bCynthia Snell _c1 _dCynthia Snell |