LoveReading has teamed up with Audiobooks.com to give you the chance to get 2 free audiobooks when you sign up. Try it for 30 days for free with no strings attached. You can cancel anytime, although we're sure you'll love it. Click the button to find out more:Find out more
Internet technologies have revolutionised the way that business is conducted. However, these innovations expose your business to various risks. Inadequate security can lead to the theft of customer data, and in the event of technological failure or a cyber-attack, your business could lose its ability to function altogether. An effective risk management strategy is, therefore, vital to your company's survival. Cyber Risks for Business Professionals: A Management Guide is a general guide to the origins of cyber risks and to developing suitable strategies for their management. It provides a breakdown of the main risks involved and shows you how to manage them. Covering the relevant legislation on information security and data protection, the author combines his legal expertise with a solid, practical grasp of the latest developments in IT to offer a comprehensive overview of a highly complex subject. Drawing on interviews with experts from Clifford Chance, Capgemini and Morgan Stanley amongst others, the book examines the operational and technological risks alongside the legal and compliance issues. This book will be invaluable to lawyers and accountants, as well as to company directors and business professionals. It explores the security complications that have arisen as a result of the use of laptop computers and memory sticks for remote working and other topics covered include PCI DSS (payment card industry data security standard), Cloud Computing and employee use of social networking sites. About the author: Rupert Kendrick was formerly a practising solicitor. More recently he has been a director in a risk management consultancy, addressing legal IT and Internet risk issues. Rupert Kendrick is the author of Outsourcing IT: A Governance Guide, also published by IT Governance.
|Publication date:||26th October 2010|
|Publisher:||IT Governance Publishing|
|Categories:||Management & management techniques, Network security, Coding theory & cryptology, Data encryption,|