You are previewing Beyond Cybersecurity: Protecting Your Digital Business.
O'Reilly logo
Beyond Cybersecurity: Protecting Your Digital Business

Book Description

Move beyond cybersecurity to take protection of your digital business to the next level

Beyond Cybersecurity: Protecting Your Digital Business arms your company against devastating online security breaches by providing you with the information and guidance you need to avoid catastrophic data compromise. Based upon highly-regarded risk assessment analysis, this critical text is founded upon proprietary research, client experience, and interviews with over 200 executives, regulators, and security experts, offering you a well-rounded, thoroughly researched resource that presents its findings in an organized, approachable style. In addition to the text, you receive access to digital materials that further reinforce key concepts, including a cybersecurity risk maturity survey, cybersecurity templates and checklists, and access to all survey results associated with cybersecurity.

Members of the global economy have spent years and tens of billions of dollars fighting cyber threats—but attacks remain an immense concern in the world of online business. The threat of data compromise that can lead to the leak of important financial and personal details can make consumers suspicious of the digital economy, and cause a nosedive in their trust and confidence in online business models.

  • Understand the critical issue of cyber-attacks, and how they are both a social and a business issue that could slow the pace of innovation while wreaking financial havoc

  • Consider how step-change capability improvements can create more resilient organizations

  • Discuss how increased collaboration within the cybersecurity industry could improve alignment on a broad range of policy issues

  • Explore how the active engagement of top-level business and public leaders can achieve progress toward cyber-resiliency

  • Beyond Cybersecurity: Protecting Your Digital Business is an essential resource for business leaders who want to protect their organizations against cyber-attacks.

    Table of Contents

    1. Foreword
    2. Preface
      1. SETTING THE CONTEXT FOR DIGITAL RESILIENCE
      2. BACKGROUND AND APPROACH
      3. NOTES
    3. Executive Summary
      1. $3 TRILLION AT RISK
      2. DIGITAL RESILIENCE PROTECTS THE BUSINESS AND ENABLES INNOVATION
      3. BUSINESS LEADERS MUST DRIVE CHANGE
      4. THE BROADER ECOSYSTEM MUST ENABLE DIGITAL RESILIENCE
    4. 1 Cyber-attacks Jeopardize Companies’ Pace of Innovation
      1. RISK OF CYBER-ATTACKS REDUCES THE VALUE OF TECHNOLOGY FOR BUSINESS
      2. THE RISKS ARE HIGH FOR EVERYONE, EVERYWHERE
      3. DEFENDERS ARE FALLING BEHIND ATTACKERS
      4. NOTES
    5. 2 It Could Get Better— or $3 Trillion Worse
      1. SCENARIO PLANNING AND CYBERSECURITY
      2. SCENARIO 1: MUDDLING INTO THE FUTURE
      3. SCENARIO 2: DIGITAL BACKLASH
      4. SCENARIO 3: DIGITAL RESILIENCE
      5. NOTES
    6. 3 Prioritize Risks and Target Protections
      1. UNTARGETED SECURITY MEASURES SERVE ONLY ATTACKERS
      2. PRIORITIZE INFORMATION ASSETS AND RISKS IN A WAY THAT ENGAGES BUSINESS LEADERS
      3. PROVIDE DIFFERENTIATED PROTECTION FOR THE MOST IMPORTANT ASSETS
      4. USE FULL RANGE OF CONTROLS BUT ORGANIZE INTO TIERS
      5. DELIVERING TARGETED PROTECTION OF PRIORITY ASSETS IN PRACTICE
      6. NOTE
    7. 4 Do Business in a Digitally Resilient Way
      1. BUILD DIGITAL RESILIENCE INTO ALL BUSINESS PROCESSES
      2. ENLIST FRONTLINE PERSONNEL TO PROTECT THE ASSETS THEY USE
      3. NOTES
    8. 5 Modernize IT to Secure IT
      1. SIX WAYS TO EMBED CYBERSECURITY INTO THE IT ENVIRONMENT
      2. ENGAGE WITH IT LEADERS TO IMPLEMENT REQUIRED CHANGES
      3. NOTES
    9. 6 Engage Attackers with Active Defense
      1. THE LIMITATIONS OF PASSIVE DEFENSE
      2. KNOW THE ENEMY AND ACT ACCORDINGLY
      3. NOTES
    10. 7 After the Breach: Improve Incident Response across Business Functions
      1. DRAW UP AN INCIDENT RESPONSE PLAN
      2. TEST THE PLAN USING WAR GAMES
      3. CONDUCT POSTMORTEMS ON REAL BREACHES TO IMPROVE IR PLAN
      4. NOTES
    11. 8 Build a Program that Drives toward Digital Resilience
      1. WHAT IT TAKES TO GET TO DIGITAL RESILIENCE
      2. SIX STEPS TO LAUNCH A DIGITAL RESILIENCE PROGRAM
      3. NOTES
    12. 9 Creating a Resilient Digital Ecosystem
      1. THE DIGITAL ECOSYSTEM
      2. THE POWER OF A RESILIENT DIGITAL ECOSYSTEM
      3. WHAT’S REQUIRED TO CREATE A RESILIENT DIGITAL ECOSYSTEM
      4. COLLABORATION FOR A RESILIENT ECOSYSTEM
      5. NOTES
    13. Conclusion
      1. NOTE
    14. Acknowledgments
    15. About the Authors
      1. JAMES M. KAPLAN
      2. TUCKER BAILEY
      3. CHRIS REZEK
      4. DEREK O’HALLORAN
      5. ALAN MARCUS
    16. Index
    17. EULA