Магазин
О сервисе
Услуги
Конкурсы
Новости
Акции
Помощь
8 800 500 11 67
RUB
Сменить валюту
Войти
Поиск
Все книги
Импринты
Бестселлеры
Бесплатные
Скидки
Подборки
Книги людям
12+
Все
Экономика и бизнес
Бизнес и менеджмент
Оглавление - Digital transformation for chiefs and owners. Volume 3. Cybersecurity
Dzhimsher Chelidze
Электронная
1 000 ₽
Печатная
1 080 ₽
Читать фрагмент
Купить
Объем: 154 бумажных стр.
Формат: epub, fb2, pdfRead, mobi
Подробнее
0.0
0
Оценить
О книге
отзывы
Оглавление
Читать фрагмент
Foreword
Part 1. Why deal with information and cybersecurity?
Chapter 1. Immersion and About Money
Chapter 2. On responsibility
Chapter 3. About General Trends
Chapter 4. What happens in the Industry
Public administration and organizations
Industry and energy
Finance
Chapter 5. About Technology
Cloud computing
Mobile applications
Artificial intelligence
Blockchain
Chapter 6. How companies are attacked
Step 1. Traversing the network perimeter
Step 2. Getting maximum privileges
Step 3. Accessing and connecting to key systems
Step 4. Attack and Implement Invalid Events on Target Systems
Chapter 7. Trends and Forecasts in IS Solutions Development
Chapter 8. Conducting IS Investigations
Conclusions of the first part
Part 2. Information Security (IS) and Digital Transformation: System Approach
Chapter 9. Organizational structure and strategy
Strategy
Organizational structure
Business Processes
Chapter 10. Communication Management and Change Implementation
Communication work
Change implementation
Staff training
Chapter 11. Project and Product Management
View on IS and cyber-security from the perspective of project management
The outside perspective at digital projects and IT product development
Chapter 12. ToSL, lean production, regular management practices
Theory of systems limitation
Thrifty production
Regular management practice
Chapter 13. IT Infrastructure and Technology
Digital technologies
IT system
Classes of IT Solutions for Building Cyber Security
Outcome of the second part
Part 3. Practical recommendations and checklists
Chapter 14. Social Engineering: What and How to Resist
Technicians
Who and how falls for social engineering?
Countermeasures and recommendations
Chapter 15. Identifying Unacceptable Events
Chapter 16. Typical risks by industry
Government organizations
Industry
Financial institutions
Retail
IT and technology companies
Medical organizations
Transport and logistics
Fuel and energy complex
Telecom and Communications
Chapter 17. What you should know and be able to do…
CISO
Business Owners, CEO, CEO-1
Middle management (heads of departments) who are not involved in digital projects or unacceptable scenarios
Middle management that oversees and implements digital projects
Middle management that is at risk (involved in unacceptable scenarios, including HR and marketing)
Informal opinion leaders
Specialists involved in digital projects and unacceptable scenarios
Regular employees
Chapter 18. Vulnerability Management: Application Guidelines
Chapter 19. Roadmap
Step 1. Preparation
Step 2. Transformation
Step 3. Fixing the changes and converting the IS into a permanent function
Conclusion
Advice