|
![]() |
|||
|
||||
OverviewHow Secure are your Digital Assets? Why are so many companies losing data despite the increases in security spending? Why aren't the latest advancements in technology keeping hackers out? Whether you're a CEO, a line of business manager, or work in Information Technology watching over a company's core systems, you create and use digital assets. In most companies, these assets form some of the most important elements of your organization and require special treatment. In this book you'll learn what it means to be: Asset Focused: What does it mean to be asset focused rather than technology focused? See how cyberthieves have developed one of the most lucrative businesses our economy has seen by understanding the value of digital assets. Restrictive with Access: Who should have access to what? How can companies ensure that the right people have the proper levels of access to the information they need, while still maintaining a posture of security? Read how easy it is to gain access to data through departmental users who are just doing their job. Digitally Aware: How do digital assets differ from physical assets? How can managers and end-users approach data in a more secure fashion, while still being able to perform their job functions? Read about government officials who lost their jobs because they weren't aware of digital assets under their watch. Alert verses Lockdown: How can companies balance the need for access with requirements for security? See how a bank's approach to data security changed when they applied the same concepts they use to secure their physical branches. Ready to Respond: Most security fails. So how can companies ensure that their data will not be siphoned off over several months or years, as seen in numerous reports over the past five years? See how my own family met intruders with an effective response plan; one you can't afford not to have. Always Assessing: Most companies I speak with don't see any immediate security problems. What should companies be looking for? Read about a pharmaceutical company that unknowingly exposed over 17,000 employee records over peer to peer networks, and how to prevent this from happening to you. Holistic: How do companies move away from silos of security products to an effective strategy for securing data? Read how your own home security can provide a simple roadmap to effective corporate security. Data@Risk will teach you an asset mindset that will secure your company data against modern attacks. Full Product DetailsAuthor: David StelzlPublisher: Bravado Publishing Imprint: Bravado Publishing Dimensions: Width: 15.20cm , Height: 1.80cm , Length: 22.90cm Weight: 0.526kg ISBN: 9780982175552ISBN 10: 0982175558 Pages: 254 Publication Date: 03 April 2009 Audience: General/trade , General Format: Hardback Publisher's Status: Active Availability: Out of print, replaced by POD ![]() We will order this item for you from a manufatured on demand supplier. Table of ContentsReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |