|
![]() |
|||
|
||||
OverviewEnhance the digital security knowledge-base within any organization In today's competitive business environment, information and information technology have become crucial for a company's success. Ensuring the confidentiality of such information-financial, trade secrets, and the like-has become key. Defending the Digital Frontier, Second Edition describes where organizations are vulnerable and identifies protective measures that rely on people and process as much as technology. This book is a practical guide aimed at business leaders and executives, explaining why digital security is not a technical function, but a risk management operation, and illustrates an approach for creating an enterprise-wide security culture based on business-led risk-management principles. Ernst & Young is a global leader in professional services, providing tax, assurance, and transaction advice to thousands of individuals as well as domestic and global businesses. Ernst & Young provides independent security solutions for some of the world's most information-intensive organizations, including numerous Fortune 500 companies, and the federal government. Full Product DetailsAuthor: Ernst & Young LLP , Jan Babiak , John Butters , Mark W. DollPublisher: John Wiley & Sons Inc Imprint: John Wiley & Sons Inc Edition: 2nd edition Dimensions: Width: 15.70cm , Height: 2.40cm , Length: 23.80cm Weight: 0.440kg ISBN: 9780471680871ISBN 10: 0471680877 Pages: 272 Publication Date: 21 December 2004 Audience: College/higher education , Professional and scholarly , Tertiary & Higher Education , Professional & Vocational Format: Hardback Publisher's Status: Active Availability: Out of stock ![]() The supplier is temporarily out of stock of this item. It will be ordered for you on backorder and shipped when it becomes available. Table of ContentsList of Figures and Tables. Foreword. Preface. Acknowledgments. PART ONE: THE CHALLENGE OF THE FRONTIER. Chapter 1: Living at the Digital Frontier. Chapter 3: Organisational Components and Security Objectives. PART TWO: THE AGENDA FOR ACTION. Chapter 4: The Security Agenda. Chapter 5: The Security Life Cycle. PART THREE: THE APPROACH FOR SAFETY. Chapter 6: The Security Culture. Chapter 7: The Risk Frontier. Chapter 8: Road Map for Success. Appendix A: Security-Related Laws and Regulations. Appendix B: Threat Vectors. Appendix C: Ernst & Young 2004 Digital Security Overview: An Executive Guide and Diagnostic. Endnotes. Glossary of Digital Security Terminology. Index.Reviewsthe authors not only help readers explore the digital frontier but also empower them to identify, understand and assess these risks. ( Gulf Business, July 2005) .,. the authors not only help readers explore the digital frontier but also empower them to identify, understand and assess these risks. ( Gulf Business, July 2005) Author InformationErnst & Young LLP (www.ey.com) provides assurance and advisory business services, tax services, and consulting for domestic and global clients. The firm has 30,000 employees in 87 U.S. cities. The practice is founder and producer of the Entrepreneur of the Year awards program, sponsored nationally by CNN and CNNfn, USA Today, the Nasdaq-Amex Market Group, and the Kauffman Center for Entrepreneurial Leadership at the Ewing Marion Kauffman Foundation. Ernst & Young's Entrepreneurial Services practice is dedicated to accelerating the success of the world's best entrepreneurs. Tab Content 6Author Website:Countries AvailableAll regions |