000 | 02231nam a22002537a 4500 | ||
---|---|---|---|
999 |
_c152741 _d152741 |
||
003 | ZW-GwMSU | ||
005 | 20200629135758.0 | ||
008 | 200625b ||||| |||| 00| 0 eng d | ||
020 | _a9780648007845 | ||
040 |
_bEnglish _cMSU _erda |
||
041 | _aeng | ||
050 | _aTK5105.59 ZON | ||
100 |
_aZongo, Phillimon _eAuthor _eCyber security expert, Strategic advisor, public speaker |
||
245 |
_aThe five anchors of cyber resilience : _bwhy some enterprises are hacked into bankruptcy while others easily bounce back _cPhillimon Zongo |
||
260 |
_aVictoria _bPhillimon Zongo _c2018 |
||
300 |
_a179 pages _c18 cm. |
||
336 |
_2rdacontent _atext |
||
337 |
_2rdamedia _aunmediated _bn |
||
338 |
_2rdacarrier _avolume _bnc |
||
504 | _aIncludes bibliographical references. | ||
520 | _aIn 'The Five Anchors of Cyber Resilience', Phil Zongo, an award-winning cybersecurity expert, strips away the ambiguity and complexity associated with cyber security, and offers practical guidance to reduce cyber-risk exposure. With The Five Anchors, public and private enterprises can achieve cyber resilience through: 1. Creating cost-effective and high-impact cyber security strategies focused on business functions that underpin the enterprise's strategic advantages and the products most valued by its customers 2. Maintaining a cyber-savvy workforce, where cyber resilience is everyone's duty, from the board to frontline personnel 3. Baking digital trust into new products early in the design phase, making it an essential and discreet aspect of all digital transformation programs 4. Designing risk-based cyber-assurance programs for suppliers and business partners, fostering business agility and innovation, all while minimising exposure to third-party related cyber threats 5. Adopting lean, efficient and highly effective governance structures that can swiftly and flexibly adapt to reflect changing market needs or business circumstances By embracing The Five Anchors of cyber resilience, enterprises can focus limited resources on cybersecurity controls that will yield the highest impact; maximise the value from their cybersecurity investments; and reduce their exposure. | ||
650 | _aCyber security | ||
942 |
_2lcc _cB |