Download Digital Asset Valuation and Cyber Risk Measurement Ebook PDF

Digital Asset Valuation and Cyber Risk Measurement

Digital Asset Valuation and Cyber Risk Measurement
Principles of Cybernomics

by Keyun Ruan

  • Publisher : Academic Press
  • Release : 2019-05-29
  • Pages : 200
  • ISBN : 0128123281
  • Language : En, Es, Fr & De
GET BOOK

Digital Asset Valuation and Cyber Risk Measurement: Principles of Cybernomics is a book about the future of risk and the future of value. It examines the indispensable role of economic modeling in the future of digitization, thus providing industry professionals with the tools they need to optimize the management of financial risks associated with this megatrend. The book addresses three problem areas: the valuation of digital assets, measurement of risk exposures of digital valuables, and economic modeling for the management of such risks. Employing a pair of novel cyber risk measurement units, bitmort and hekla, the book covers areas of value, risk, control, and return, each of which are viewed from the perspective of entity (e.g., individual, organization, business), portfolio (e.g., industry sector, nation-state), and global ramifications. Establishing adequate, holistic, and statistically robust data points on the entity, portfolio, and global levels for the development of a cybernomics databank is essential for the resilience of our shared digital future. This book also argues existing economic value theories no longer apply to the digital era due to the unique characteristics of digital assets. It introduces six laws of digital theory of value, with the aim to adapt economic value theories to the digital and machine era. Comprehensive literature review on existing digital asset valuation models, cyber risk management methods, security control frameworks, and economics of information security Discusses the implication of classical economic theories under the context of digitization, as well as the impact of rapid digitization on the future of value Analyzes the fundamental attributes and measurable characteristics of digital assets as economic goods Discusses the scope and measurement of digital economy Highlights cutting-edge risk measurement practices regarding cybersecurity risk management Introduces novel concepts, models, and theories, including opportunity value, Digital Valuation Model, six laws of digital theory of value, Cyber Risk Quadrant, and most importantly, cyber risk measures hekla and bitmort Introduces cybernomics, that is, the integration of cyber risk management and economics to study the requirements of a databank in order to improve risk analytics solutions for (1) the valuation of digital assets, (2) the measurement of risk exposure of digital assets, and (3) the capital optimization for managing residual cyber risK Provides a case study on cyber insurance

Managing Cyber Risk

Managing Cyber Risk
A Book

by Ariel Evans

  • Publisher : Routledge
  • Release : 2019-03-28
  • Pages : 118
  • ISBN : 0429614268
  • Language : En, Es, Fr & De
GET BOOK

Cyber risk is the second highest perceived business risk according to U.S. risk managers and corporate insurance experts. Digital assets now represent over 85% of an organization’s value. In a survey of Fortune 1000 organizations, 83% surveyed described cyber risk as an organizationally complex topic, with most using only qualitative metrics that provide little, if any insight into an effective cyber strategy. Written by one of the foremost cyber risk experts in the world and with contributions from other senior professionals in the field, Managing Cyber Risk provides corporate cyber stakeholders – managers, executives, and directors – with context and tools to accomplish several strategic objectives. These include enabling managers to understand and have proper governance oversight of this crucial area and ensuring improved cyber resilience. Managing Cyber Risk helps businesses to understand cyber risk quantification in business terms that lead risk owners to determine how much cyber insurance they should buy based on the size and the scope of policy, the cyber budget required, and how to prioritize risk remediation based on reputational, operational, legal, and financial impacts. Directors are held to standards of fiduciary duty, loyalty, and care. These insights provide the ability to demonstrate that directors have appropriately discharged their duties, which often dictates the ability to successfully rebut claims made against such individuals. Cyber is a strategic business issue that requires quantitative metrics to ensure cyber resiliency. This handbook acts as a roadmap for executives to understand how to increase cyber resiliency and is unique since it quantifies exposures at the digital asset level.

Cybersecurity in the Digital Age

Cybersecurity in the Digital Age
Tools, Techniques, & Best Practices

by Gregory A. Garrett

  • Publisher : Wolters Kluwer Law & Business
  • Release : 2018-12-17
  • Pages : 554
  • ISBN : 1543812791
  • Language : En, Es, Fr & De
GET BOOK

Produced by a team of 14 cybersecurity experts from five countries, Cybersecurity in the Digital Age is ideally structured to help everyone—from the novice to the experienced professional—understand and apply both the strategic concepts as well as the tools, tactics, and techniques of cybersecurity. Among the vital areas covered by this team of highly regarded experts are: Cybersecurity for the C-suite and Board of Directors Cybersecurity risk management framework comparisons Cybersecurity identity and access management – tools & techniques Vulnerability assessment and penetration testing – tools & best practices Monitoring, detection, and response (MDR) – tools & best practices Cybersecurity in the financial services industry Cybersecurity in the healthcare services industry Cybersecurity for public sector and government contractors ISO 27001 certification – lessons learned and best practices With Cybersecurity in the Digital Age, you immediately access the tools and best practices you need to manage: Threat intelligence Cyber vulnerability Penetration testing Risk management Monitoring defense Response strategies And more! Are you prepared to defend against a cyber attack? Based entirely on real-world experience, and intended to empower you with the practical resources you need today, Cybersecurity in the Digital Age delivers: Process diagrams Charts Time-saving tables Relevant figures Lists of key actions and best practices And more! The expert authors of Cybersecurity in the Digital Age have held positions as Chief Information Officer, Chief Information Technology Risk Officer, Chief Information Security Officer, Data Privacy Officer, Chief Compliance Officer, and Chief Operating Officer. Together, they deliver proven practical guidance you can immediately implement at the highest levels.

Roadmap to an Enterprise Security Program

Roadmap to an Enterprise Security Program
A Book

by Anonim

  • Publisher : American Bar Association
  • Release : 2005
  • Pages : 54
  • ISBN : 9781590315019
  • Language : En, Es, Fr & De
GET BOOK

Principles and Practice of Information Security

Principles and Practice of Information Security
Protecting Computers from Hackers and Lawyers

by Linda Volonino,Stephen R. Robinson,Charles P. Volonino

  • Publisher : Prentice Hall
  • Release : 2004
  • Pages : 232
  • ISBN : 9876543210XXX
  • Language : En, Es, Fr & De
GET BOOK

This book provides professionals with the necessary managerial, technical, and legal background to support investment decisions in security technology. It discusses security from the perspective of hackers (i.e., technology issues and defenses) and lawyers (i.e., legal issues and defenses). This cross-disciplinary book is designed to help users quickly become current on what has become a fundamental business issue. This book covers the entire range of best security practices—obtaining senior management commitment, defining information security goals and policies, transforming those goals into a strategy for monitoring intrusions and compliance, and understanding legal implications. Topics also include computer crime, electronic evidence, cyber terrorism, and computer forensics. For professionals in information systems, financial accounting, human resources, health care, legal policy, and law. Because neither technical nor legal expertise is necessary to understand the concepts and issues presented, this book can be required reading for everyone as part of an enterprise-wide computer security awareness program.

Think Like Amazon: 50 1/2 Ideas to Become a Digital Leader

Think Like Amazon: 50 1/2 Ideas to Become a Digital Leader
A Book

by John Rossman

  • Publisher : McGraw Hill Professional
  • Release : 2019-05-03
  • Pages : 272
  • ISBN : 1260455505
  • Language : En, Es, Fr & De
GET BOOK

The former Amazon executive who launched and scaled Amazon Marketplace delivers the ultimate playbook on how to “think like Amazon” and succeed in the digital age. “What would Jeff do?” Since leaving Amazon to advise start-ups and corporations, John Rossman has been asked this question countless times by executives who want to know “the secret” behind Amazon’s historic success. In this step-by-step guide, he provides 50 1⁄2 answers drawn from his experience as an Amazon executive—and shows today’s business leaders how to think like Amazon, strategize like Bezos, and beat the competition like nobody’s business. Learn how to: •Move forward to get back to Day 1—and change the status quo.•Become a platform company—with the right platform strategy.•Create customer obsession—and grant your customers superpowers.•Experiment, fail, rinse, and repeat.•Decentralize your way to digital greatness.•Master the magic of small autonomous teams.•Avoid the trap of past positions.•Make better and faster decisions.•Use metrics to create a culture of accountability and innovation•Use AI and the Internet of Things to reinvent customer experiences. In addition to these targeted strategies, you’ll receive a rare inside glimpse into how Jeff Bezos and Amazon take a remarkably consistent approach to innovate, explore new markets, and spark new growth. You’ll understand the unique mindset and inner workings that drive Amazon’s operational excellence, from its ground-up approach to new digital markets to its out-of-the-box attitudes on innovation. Along the way, you’ll learn specific game-changing strategies that made Amazon stand out in a crowded digital world. These include actionable ideas that you can use to transform your culture, expand your business into digital, and become the kind of platform company that customers obsess over. Rossman also offers invaluable insights into the latest technologies, e-commerce marketing, online culture, and IoT disruptions that only an Amazon insider would know. If you want to compete and win in the digital era, you have to Think Like Amazon.

Digital Security Risk Management for Economic and Social Prosperity OECD Recommendation and Companion Document

Digital Security Risk Management for Economic and Social Prosperity OECD Recommendation and Companion Document
OECD Recommendation and Companion Document

by OECD

  • Publisher : OECD Publishing
  • Release : 2015-10-01
  • Pages : 72
  • ISBN : 9264245472
  • Language : En, Es, Fr & De
GET BOOK

This OECD Recommendation and its Companion Document provide guidance for all stakeholders on the economic and social prosperity dimensions of digital security risk.

Measuring and Managing Information Risk

Measuring and Managing Information Risk
A FAIR Approach

by Jack Freund,Jack Jones

  • Publisher : Butterworth-Heinemann
  • Release : 2014-08-23
  • Pages : 408
  • ISBN : 0127999329
  • Language : En, Es, Fr & De
GET BOOK

Using the factor analysis of information risk (FAIR) methodology developed over ten years and adopted by corporations worldwide, Measuring and Managing Information Risk provides a proven and credible framework for understanding, measuring, and analyzing information risk of any size or complexity. Intended for organizations that need to either build a risk management program from the ground up or strengthen an existing one, this book provides a unique and fresh perspective on how to do a basic quantitative risk analysis. Covering such key areas as risk theory, risk calculation, scenario modeling, and communicating risk within the organization, Measuring and Managing Information Risk helps managers make better business decisions by understanding their organizational risk. Uses factor analysis of information risk (FAIR) as a methodology for measuring and managing risk in any organization. Carefully balances theory with practical applicability and relevant stories of successful implementation. Includes examples from a wide variety of businesses and situations presented in an accessible writing style.

The Cyber Risk Handbook

The Cyber Risk Handbook
Creating and Measuring Effective Cybersecurity Capabilities

by Domenic Antonucci

  • Publisher : John Wiley & Sons
  • Release : 2017-05
  • Pages : 448
  • ISBN : 1119308801
  • Language : En, Es, Fr & De
GET BOOK

Actionable guidance and expert perspective for real-world cybersecurity The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world situations, and cross-functional solutions for enterprise-wide improvement. Beginning with an overview of counter-cyber evolution, the discussion quickly turns practical with design and implementation guidance for the range of capabilities expected of a robust cyber risk management system that is integrated with the enterprise risk management (ERM) system. Expert contributors from around the globe weigh in on specialized topics with tools and techniques to help any type or size of organization create a robust system tailored to its needs. Chapter summaries of required capabilities are aggregated to provide a new cyber risk maturity model used to benchmark capabilities and to road-map gap-improvement. Cyber risk is a fast-growing enterprise risk, not just an IT risk. Yet seldom is guidance provided as to what this means. This book is the first to tackle in detail those enterprise-wide capabilities expected by Board, CEO and Internal Audit, of the diverse executive management functions that need to team up with the Information Security function in order to provide integrated solutions. Learn how cyber risk management can be integrated to better protect your enterprise Design and benchmark new and improved practical counter-cyber capabilities Examine planning and implementation approaches, models, methods, and more Adopt a new cyber risk maturity model tailored to your enterprise needs The need to manage cyber risk across the enterprise—inclusive of the IT operations—is a growing concern as massive data breaches make the news on an alarmingly frequent basis. With a cyber risk management system now a business-necessary requirement, practitioners need to assess the effectiveness of their current system, and measure its gap-improvement over time in response to a dynamic and fast-moving threat landscape. The Cyber Risk Handbook brings the world's best thinking to bear on aligning that system to the enterprise and vice-a-versa. Every functional head of any organization must have a copy at-hand to understand their role in achieving that alignment.

How to Measure Anything in Cybersecurity Risk

How to Measure Anything in Cybersecurity Risk
A Book

by Douglas W. Hubbard,Richard Seiersen

  • Publisher : John Wiley & Sons
  • Release : 2016-07-25
  • Pages : 304
  • ISBN : 1119085292
  • Language : En, Es, Fr & De
GET BOOK

A ground shaking exposé on the failure of popular cyber risk management methods How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current "risk management" practices, and offers a series of improvement techniques that help you fill the holes and ramp up security. In his bestselling book How to Measure Anything, author Douglas W. Hubbard opened the business world's eyes to the critical need for better measurement. This book expands upon that premise and draws from The Failure of Risk Management to sound the alarm in the cybersecurity realm. Some of the field's premier risk management approaches actually create more risk than they mitigate, and questionable methods have been duplicated across industries and embedded in the products accepted as gospel. This book sheds light on these blatant risks, and provides alternate techniques that can help improve your current situation. You'll also learn which approaches are too risky to save, and are actually more damaging than a total lack of any security. Dangerous risk management methods abound; there is no industry more critically in need of solutions than cybersecurity. This book provides solutions where they exist, and advises when to change tracks entirely. Discover the shortcomings of cybersecurity's "best practices" Learn which risk management approaches actually create risk Improve your current practices with practical alterations Learn which methods are beyond saving, and worse than doing nothing Insightful and enlightening, this book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection, so finding cracks in the vault is a positive thing—as long as you get there before the bad guys do. How to Measure Anything in Cybersecurity Risk is your guide to more robust protection through better quantitative processes, approaches, and techniques.

Enhancing the Role of Insurance in Cyber Risk Management

Enhancing the Role of Insurance in Cyber Risk Management
A Book

by OECD

  • Publisher : OECD Publishing
  • Release : 2017-12-08
  • Pages : 140
  • ISBN : 9264282149
  • Language : En, Es, Fr & De
GET BOOK

This report provides an overview of the financial impact of cyber incidents, the coverage of cyber risk available in the insurance market, the challenges to market development and initiatives to address those challenges.

Information Security Law

Information Security Law
Control of Digital Assets

by Mark G. Milone

  • Publisher : Law Journal Seminars Press
  • Release : 2006
  • Pages : 1132
  • ISBN : 9876543210XXX
  • Language : En, Es, Fr & De
GET BOOK

Information Security Law: Control of Digital Assets provides encyclopedic coverage of both the technologies used to protect a network and the laws and policies that bolster them.

Ten Strategies of a World-Class Cybersecurity Operations Center

Ten Strategies of a World-Class Cybersecurity Operations Center
A Book

by Carson Zimmerman

  • Publisher : Unknown Publisher
  • Release : 2014-07-01
  • Pages : 329
  • ISBN : 9780692243107
  • Language : En, Es, Fr & De
GET BOOK

Ten Strategies of a World-Class Cyber Security Operations Center conveys MITRE's accumulated expertise on enterprise-grade computer network defense. It covers ten key qualities of leading Cyber Security Operations Centers (CSOCs), ranging from their structure and organization, to processes that best enable smooth operations, to approaches that extract maximum value from key CSOC technology investments. This book offers perspective and context for key decision points in structuring a CSOC, such as what capabilities to offer, how to architect large-scale data collection and analysis, and how to prepare the CSOC team for agile, threat-based response. If you manage, work in, or are standing up a CSOC, this book is for you. It is also available on MITRE's website, www.mitre.org.

Risk Management for Computer Security

Risk Management for Computer Security
Protecting Your Network and Information Assets

by Andy Jones,Debi Ashenden

  • Publisher : Butterworth-Heinemann
  • Release : 2005
  • Pages : 274
  • ISBN : 0750677953
  • Language : En, Es, Fr & De
GET BOOK

The information systems security (InfoSec) profession remains one of the fastest growing professions in the world today. With the advent of the Internet and its use as a method of conducting business, even more emphasis is being placed on InfoSec. However, there is an expanded field of threats that must be addressed by today's InfoSec and information assurance (IA) professionals. Operating within a global business environment with elements of a virtual workforce can create problems not experienced in the past. How do you assess the risk to the organization when information can be accessed, remotely, by employees in the field or while they are traveling internationally? How do you assess the risk to employees who are not working on company premises and are often thousands of miles from the office? How do you assess the risk to your organization and its assets when you have offices or facilities in a nation whose government may be supporting the theft of the corporate "crown jewels" in order to assist their own nationally owned or supported corporations? If your risk assessment and management program is to be effective, then these issues must be assessed. Personnel involved in the risk assessment and management process face a much more complex environment today than they have ever encountered before. This book covers more than just the fundamental elements that make up a good risk program. It provides an integrated "how to" approach to implementing a corporate program, complete with tested methods and processes; flowcharts; and checklists that can be used by the reader and immediately implemented into a computer and overall corporate security program. The challenges are many and this book will help professionals in meeting their challenges as we progress through the 21st Century. *Presents material in an engaging, easy-to-follow manner that will appeal to both advanced INFOSEC career professionals and network administrators entering the information security profession *Addresses the needs of both the individuals who are new to the subject as well as of experienced professionals *Provides insight into the factors that need to be considered & fully explains the numerous methods, processes & procedures of risk management

The Privacy Engineer's Manifesto

The Privacy Engineer's Manifesto
Getting from Policy to Code to QA to Value

by Michelle Dennedy,Jonathan Fox,Tom Finneran

  • Publisher : Apress
  • Release : 2014-03-04
  • Pages : 400
  • ISBN : 1430263563
  • Language : En, Es, Fr & De
GET BOOK

"It's our thesis that privacy will be an integral part of the next wave in the technology revolution and that innovators who are emphasizing privacy as an integral part of the product life cycle are on the right track." --The authors of The Privacy Engineer's Manifesto The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value is the first book of its kind, offering industry-proven solutions that go beyond mere theory and adding lucid perspectives on the challenges and opportunities raised with the emerging "personal" information economy. The authors, a uniquely skilled team of longtime industry experts, detail how you can build privacy into products, processes, applications, and systems. The book offers insight on translating the guiding light of OECD Privacy Guidelines, the Fair Information Practice Principles (FIPPs), Generally Accepted Privacy Principles (GAPP) and Privacy by Design (PbD) into concrete concepts that organizations, software/hardware engineers, and system administrators/owners can understand and apply throughout the product or process life cycle—regardless of development methodology—from inception to retirement, including data deletion and destruction. In addition to providing practical methods to applying privacy engineering methodologies, the authors detail how to prepare and organize an enterprise or organization to support and manage products, process, systems, and applications that require personal information. The authors also address how to think about and assign value to the personal information assets being protected. Finally, the team of experts offers thoughts about the information revolution that has only just begun, and how we can live in a world of sensors and trillions of data points without losing our ethics or value(s)...and even have a little fun. The Privacy Engineer's Manifesto is designed to serve multiple stakeholders: Anyone who is involved in designing, developing, deploying and reviewing products, processes, applications, and systems that process personal information, including software/hardware engineers, technical program and product managers, support and sales engineers, system integrators, IT professionals, lawyers, and information privacy and security professionals. This book is a must-read for all practitioners in the personal information economy. Privacy will be an integral part of the next wave in the technology revolution; innovators who emphasize privacy as an integral part of the product life cycle are on the right track. Foreword by Dr. Eric Bonabeau, PhD, Chairman, Icosystem, Inc. & Dean of Computational Sciences, Minerva Schools at KGI.

Cyber-Risk Management

Cyber-Risk Management
A Book

by Atle Refsdal,Bjørnar Solhaug,Ketil Stølen

  • Publisher : Springer
  • Release : 2015-10-01
  • Pages : 145
  • ISBN : 3319235702
  • Language : En, Es, Fr & De
GET BOOK

This book provides a brief and general introduction to cybersecurity and cyber-risk assessment. Not limited to a specific approach or technique, its focus is highly pragmatic and is based on established international standards (including ISO 31000) as well as industrial best practices. It explains how cyber-risk assessment should be conducted, which techniques should be used when, what the typical challenges and problems are, and how they should be addressed. The content is divided into three parts. First, part I provides a conceptual introduction to the topic of risk management in general and to cybersecurity and cyber-risk management in particular. Next, part II presents the main stages of cyber-risk assessment from context establishment to risk treatment and acceptance, each illustrated by a running example. Finally, part III details four important challenges and how to reasonably deal with them in practice: risk measurement, risk scales, uncertainty, and low-frequency risks with high consequence. The target audience is mainly practitioners and students who are interested in the fundamentals and basic principles and techniques of security risk assessment, as well as lecturers seeking teaching material. The book provides an overview of the cyber-risk assessment process, the tasks involved, and how to complete them in practice.

International Journal of Micrographics & Optical Technology

International Journal of Micrographics & Optical Technology
A Book

by Anonim

  • Publisher : Unknown Publisher
  • Release : 2006
  • Pages : 329
  • ISBN : 9876543210XXX
  • Language : En, Es, Fr & De
GET BOOK

Cyber-Risk Informatics

Cyber-Risk Informatics
Engineering Evaluation with Data Science

by Mehmet Sahinoglu

  • Publisher : John Wiley & Sons
  • Release : 2016-04-29
  • Pages : 560
  • ISBN : 111908752X
  • Language : En, Es, Fr & De
GET BOOK

This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity vulnerabilities and threats. This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity threats. The author builds from a common understanding based on previous class-tested works to introduce the reader to the current and newly innovative approaches to address the maliciously-by-human-created (rather than by-chance-occurring) vulnerability and threat, and related cost-effective management to mitigate such risk. This book is purely statistical data-oriented (not deterministic) and employs computationally intensive techniques, such as Monte Carlo and Discrete Event Simulation. The enriched JAVA ready-to-go applications and solutions to exercises provided by the author at the book’s specifically preserved website will enable readers to utilize the course related problems. • Enables the reader to use the book's website's applications to implement and see results, and use them making ‘budgetary’ sense • Utilizes a data analytical approach and provides clear entry points for readers of varying skill sets and backgrounds • Developed out of necessity from real in-class experience while teaching advanced undergraduate and graduate courses by the author Cyber-Risk Informatics is a resource for undergraduate students, graduate students, and practitioners in the field of Risk Assessment and Management regarding Security and Reliability Modeling. Mehmet Sahinoglu, a Professor (1990) Emeritus (2000), is the founder of the Informatics Institute (2009) and its SACS-accredited (2010) and NSA-certified (2013) flagship Cybersystems and Information Security (CSIS) graduate program (the first such full degree in-class program in Southeastern USA) at AUM, Auburn University’s metropolitan campus in Montgomery, Alabama. He is a fellow member of the SDPS Society, a senior member of the IEEE, and an elected member of ISI. Sahinoglu is the recipient of Microsoft's Trustworthy Computing Curriculum (TCC) award and the author of Trustworthy Computing (Wiley, 2007).

The Security Risk Assessment Handbook

The Security Risk Assessment Handbook
A Complete Guide for Performing Security Risk Assessments, Second Edition

by Douglas Landoll

  • Publisher : CRC Press
  • Release : 2016-04-19
  • Pages : 504
  • ISBN : 1439821496
  • Language : En, Es, Fr & De
GET BOOK

The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments provides detailed insight into precisely how to conduct an information security risk assessment. Designed for security professionals and their customers who want a more in-depth understanding of the risk assessment process, this volume contains real-wor

Digital Resilience

Digital Resilience
Is Your Company Ready for the Next Cyber Threat?

by Ray Rothrock

  • Publisher : AMACOM
  • Release : 2018-04-19
  • Pages : 256
  • ISBN : 081443925X
  • Language : En, Es, Fr & De
GET BOOK

Don’t let your company be the next grim headline . . . Cybercrime is on the rise — and businesses large and small are at risk. For management, the question is not if you will be targeted, but when. Are you prepared? Is your enterprise actively monitoring networks, taking steps to understand and contain attacks, enabling continued operation during an incident? Do you have a recovery plan ready? Few are prepared, explains cybersecurity expert Ray Rothrock, who lays bare tactics used by hackers, vulnerabilities lurking in networks, and strategies not just for surviving attacks, but thriving even while under assault. Fascinating and highly readable, Digital Resilience opens with the infamous 2013 Target attack, which compromised the credit card information of 40 million customers. In hindsight, the hack (like most today) was preventable. This book helps businesses: Understand the threats they face • Assess the resilience of their networks against attacks • Identify and address weaknesses • Respond to exploits swiftly and effectively Data theft. Downed servers. Malware. Even human error can trigger cyber events anytime from anywhere around the globe. This powerful guide provides the resilience-building strategies you need to prevail — no matter what strikes.