Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks

Overview

Conquering cyber attacks requires a multi-sector, multi-modal approach

Cyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks facing all facets of government and industry, and the various factors that must align to maintain information integrity. Written by one of the nation's most highly respected cyber risk analysts, the book describes how businesses and government agencies must protect their most valuable...

See more details below
Other sellers (Hardcover)
  • All (12) from $24.81   
  • New (8) from $27.68   
  • Used (4) from $24.81   

Overview

Conquering cyber attacks requires a multi-sector, multi-modal approach

Cyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks facing all facets of government and industry, and the various factors that must align to maintain information integrity. Written by one of the nation's most highly respected cyber risk analysts, the book describes how businesses and government agencies must protect their most valuable assets to avoid potentially catastrophic consequences. Much more than just cyber security, the necessary solutions require government and industry to work cooperatively and intelligently. This resource reveals the extent of the problem, and provides a plan to change course and better manage and protect critical information.

Recent news surrounding cyber hacking operations show how intellectual property theft is now a matter of national security, as well as economic and commercial security. Consequences are far-reaching, and can have enormous effects on national economies and international relations. Aggressive cyber forces in China, Russia, Eastern Europe and elsewhere, the rise of global organized criminal networks, and inattention to vulnerabilities throughout critical infrastructures converge to represent an abundantly clear threat. Managing the threat and keeping information safe is now a top priority for global businesses and government agencies. Cyber Threat! breaks the issue down into real terms, and proposes an approach to effective defense. Topics include:

  • The information at risk
  • The true extent of the threat
  • The potential consequences across sectors
  • The multifaceted approach to defense

The growing cyber threat is fundamentally changing the nation's economic, diplomatic, military, and intelligence operations, and will extend into future technological, scientific, and geopolitical influence. The only effective solution will be expansive and complex, encompassing every facet of government and industry. Cyber Threat! details the situation at hand, and provides the information that can help keep the nation safe.

Read More Show Less

Product Details

  • ISBN-13: 9781118836354
  • Publisher: Wiley
  • Publication date: 7/28/2014
  • Series: Wiley Corporate F&A Series
  • Edition number: 1
  • Pages: 224
  • Sales rank: 1,448,534
  • Product dimensions: 9.10 (w) x 6.30 (h) x 0.90 (d)

Meet the Author

MacDONNELL ULSCH is currently a managing director of cyber crime and breach response at a large international consulting firm. He is the author of the highly regarded book Threat! Managing Risk in a Hostile World. Mr. Ulsch has investigated many high-impact cyber breach and technology espionage cases and advises a diverse range of private-sector and government clients on the cyber threat, how to manage a cyber attack when it occurs, and how to reduce the risk impact of one. He has appeared on Fox News, ABC News, and other media outlets, and has been quoted in many publications, including academic and military studies.

Read More Show Less

Table of Contents

Foreword xiii

Preface xv

Acknowledgments xvii

Introduction: What Every Current and Future Senior Executive Must Know about the Cyber Threat: A Perfect Digital Storm Is Forming 1

What Factors Create a Perfect Storm? 2

Increasingly Sophisticated Attacks 8

Mobile Devices at Higher Risk 9

Sometimes Security Just Doesn’t Take Hold 9

It Wasn’t Always Like This 10

Without a Bang 11

A Board Issue 12

The Cyber Frankenstein Cometh 13

Defining Success 14

Notes 15

PART I: THE CYBER THREAT TO THE CORPORATE BRAND: HOW IT WILL IMPACT YOUR COMPANY

Chapter 1: The Rise of Cyber Organized Crime and Its Global Impact 19

Is Nothing Sacred? 23

The Liberty Reserve Case: Money Laundering in the Digital Age 24

The Corruption Factor 27

Information Threat, Physical Threat 32

Notes 33

Chapter 2: The Emergence of the Cyber Nation-State and Technology Espionage: Red China Rising and Its Global Cyber Theft Strategy 35

A Case of Cyber Espionage Conspiracy? 43

According to the Select Committee . . . 54

Notes 55

Chapter 3: Cyber Al Qaeda Poses a Threat to Critical Infrastructure 57

A Disabled America 59

A New Age: Inspiring Terrorists and Terrorism 62

A Call Heard Vaguely 64

Attack upon Attack, No Peace in Sight 67

Notes 68

PART II: CORPORATE VULNERABILITIES IN THE DIGITAL SOCIETY: PREPARE TO DEFEND YOURSELF AND YOUR BRAND

Chapter 4: What Is the True Cost of a Cyber Attack? 71

Cyber Attack Detection Sometimes Takes Years 74

One of the First Questions: “How Much Will This Cost?” 76

A Few Common Cost Factors 77

What about Unreported Breaches? 78

Cyber Attacks Result in a Wider Impact: The Community 81

Notes 83

Chapter 5: U.S. Cyber Public Policy: Don’t Rely on It to Protect the Brand 85

No Guarantees with This Executive Order 88

Government-Industry Cooperation: No Silver Bullet 91

The Challenge of Defining Cyber Public Policy 92

Cold War II: The Cyber Chapter 93

Is There a Silver Lining in an Attack? 97

Notes 102

Chapter 6: Four Trends Driving Cyber Breaches and Increasing Corporate Risk: Technological, Cultural, Economic, and Geopolitical Shifts 103

Technology Trend 104

Loss of Situational Awareness: Distraction 107

Culture 108

Technology Is a Double-Edged Sword 109

Notes 112

Chapter 7: Social Media and Digital Protest 113

Social Media: A Tool for Disruption, a Model for Change 116

The Hacker Group Anonymous 117

Anarchaos: In the Image of Anonymous 125

Notes 126

PART III: PROTECTING THE BRAND: ACTIONS EXECUTIVE MANAGEMENT MUST TAKE TO REDUCE CYBER RISK

Chapter 8: Managing the Brand When the Worst Occurs 129

Be Prepared 132

Chapter 9: Managing the Big Risk: Third-Party Vendors 145

Background Investigation Suggestions to Improve Process 149

Risk-Reinforced Service Level Agreements 154

Clouds Fill the Horizon 166

Notes 169

Chapter 10: Creating Executive Cyber Risk Councils 171

The Goal of the Executive Cyber Risk Council 175

Who Should Be Included in the Executive Risk Council? 176

Chapter 11: Early Warnings: Something Bad Is on the Way 185

Technical Signals Are There—But You’ve Got to Look 187

Know Who’s Inside the Enterprise 190

What a Web We Weave . . . When Surfing 192

About the Author 197

Index 199

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)