000 05151cam a2200361Ii 4500
001 on1111475093
003 OCoLC
005 20240726105214.0
008 190803s2019 xx o 000 0 eng d
040 _aEBLCP
_beng
_epn
_erda
_cEBLCP
_dYDX
_dOCLCQ
_dNT
_dEBLCP
_dOCLCF
_dCNO
020 _a9781633697881
_q((electronic)l(electronic)ctronic)
050 0 4 _aQA76
_b.C934 2019
049 _aMAIN
245 1 0 _aCybersecurity :
_bthe Insights You Need from Harvard Business Review.
_c
260 _aBoston, Massachusetts :
_bHarvard Business Review Press,
_c(c)2019.
300 _a1 online resource (xvi, 158 pages)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _adata file
_2rda
490 1 _aInsights you need from Harvard Business Review
504 _a2
520 0 _aToo many of us associate cybersecurity with credit card theft and think the solution is for our banking partners, social media platforms, and large retailers to improve and increase their data security practices. But in the world we live and work in, where our systems are increasingly interconnected and our employees and customers are logging in to access their work or our products from all over the world and on all types of devices, the risk is much greater than we imagine. As the complexity and sophistication of our interconnected systems increases, so too do the skills of our adversaries. From outlining the challenges to exploring the solutions, Cybersecurity: The Insights You Need from Harvard Business Review will help leaders address the managerial, organizational, and strategic aspects of these ever-present threats to your organization. Catch up on current topics and deepen your understanding of them with the Insights You Need series from Harvard Business Review. Featuring some of HBR's best and most recent thinking, Insights You Need titles are both a primer on today's most pressing issues and an extension of the conversation, with interesting research, interviews, case studies, and practical ideas to help you explore how a particular issue will impact your company and what it will mean for you and your business.--
_cProvided by publisher.
505 0 0 _aIntroduction /
_rby Alex Blau --
_tInternet insecurity: if your mission-critical systems are digital and connected, they can never be made fully safe /
_rby Andy Bochman --
_tSecurity trends by the numbers: the good news is that companies are stopping more attacks than ever --
_tyou can probably guess the bad news /
_rby Scott Berinato and Matt Perry --
_tWhy boards aren't dealing with cyberthreats: because they're too busy focusing on areas they have expertise in, such as retaining talent and monitoring the regulatory environment /
_rby J. Yo-Jud Cheng and Boris Groysberg --
_tThe behavioral economics of why executives underinvest in cybersecurity: leaders need to stop thinking about cybersecurity as a problem that can be solved /
_rby Alex Blau --
_tWhy the entire c-suite needs to use the same metrics for cyber risk: but before that, leaders must create a common language around cybersecurity /
_rby Jason J. Hogg --
_tThe best cybersecurity investment you can make is better training: your first and last line of defense is prepared leaders and employees /
_rby Dante Disparte and Chris Furlow --
_tBetter cybersecurity starts with fixing your employees' bad habits: ways to neturalize predictably poor user behavior /
_rby Alex Blau --
_tThe key to better cybersecurity: keep employee rules simple --
_tpeople look for workarounds when policies are too complicated /
_rby Maarten Van Horenbeeck --
_tThe avoidable mistakes executives continue to make after a data breach: you will get hacked --
_there's what not to do when it happens /
_rby Bill Bourdon --
_tActive defense and "hacking back": a primer --
_tpassive monitoring isn't your only choice /
_rby Scott Berinato --
_tCybersecurity is putting customer trust at the center of competition: don't just protect customer data --
_tdemonstrate that you're doing everything in your power to minimize breaches /
_rby Andrew Burt --
_tPrivacy and cybersecurity are converging: here's why that matters for people and for companies --
_tbig data and machine learning could kill the notion of consent /
_rby Andrew Burt --
_tWhat countries and companies can do when trade and cybersecurity overlap: a framework for understanding and categorizing cybersecurity concerns involved in trade /
_rby Stuart Madnick, Simon Johnson, and Keman Huang --
_tAI is the future of cybersecurity, for better and for worse: it will become both the problem and the solution /
_rby Roman V. Yampolskiy.
530 _a2
_ub
650 0 _aComputer security.
650 0 _aBusiness enterprises
_xSecurity measures.
655 1 _aElectronic Books.
856 4 0 _uhttps://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2003607&site=eds-live&custid=s3260518
_zClick to access digital title | log in using your CIU ID number and my.ciu.edu password
942 _cOB
_D
_eEB
_hQA..
_m2019
_QOL
_R
_x
_8NFIC
_2LOC
994 _a92
_bNT
999 _c92536
_d92536
902 _a1
_bCynthia Snell
_c1
_dCynthia Snell