The Second Economy: The Race for Trust, Treasure and Time in the Cybersecurity War

Steve Grobman

  • 出版商: Apress
  • 出版日期: 2016-10-07
  • 售價: $1,820
  • 貴賓價: 9.5$1,729
  • 語言: 英文
  • 頁數: 232
  • 裝訂: Paperback
  • ISBN: 1484222288
  • ISBN-13: 9781484222287
  • 相關分類: 資訊安全
  • 海外代購書籍(需單獨結帳)

相關主題

商品描述

Gain a practical prescription for both private and public organizations to remediate threats and maintain a competitive pace to lead and thrive in an ever-shifting environment.

In today’s hyper-connected, always-on era of pervasive mobility, cloud computing and intelligent connected devices, virtually every step we take, every transaction we initiate, and every interaction we have are supported in some way by this vast global infrastructure. This set of interconnected systems comprises the fundamental building blocks of the second economy – the very foundation of our first economy. And adversaries, whether motivated by profit, principle or province, are singularly focused on winning the race through a relentless portfolio of shifting attack vectors.

Make no mistake about it, we are running a race. This is a race against a faceless, nameless adversary – one that dictates the starting line, the rules of the road, and what trophies are at stake. Established assumptions must be challenged, strategies must be revised, and long-held practices must be upended to run this race and effectively compete. 

The Second Economy highlights a second to none approach in this fight, as the effectiveness and ROI of security solutions are increasingly measured by the business outcomes they enable.

 What You Will Learn:

  • Understand the value of time and trust in a cyber-warfare world
  • Enable agile and intelligent organizations to minimize their risk of falling victim to the next attack
  • Accelerate response time by adopting a holistic approach
  • Eliminate friction across the threat defense lifecycle, from protection to detection to correction
  • Gain a sustainable competitive advantage by seizing first mover advantage
  • Deploy solutions across an open, integrated security framework

Who This Book Is For:

Senior-level IT decision makers concerned with ascribing business value to a robust security strategy. The book also addresses business decision makers who must be educated about the pervasive and growing cyber threatscape (including CXOs, board directors, and functional leaders) as well as general business employees to understand how they may become unwitting participants in a complex cyber war.


商品描述(中文翻譯)

獲得一個實用的處方,幫助私營和公共組織修復威脅,並保持競爭步伐,以在不斷變化的環境中領先並蓬勃發展。

在當今這個超連接、隨時隨地的移動性、雲計算和智能連接設備的時代,我們所採取的每一步、每一筆交易以及每一次互動,都在某種程度上受到這個龐大全球基礎設施的支持。這一系列互聯系統構成了第二經濟的基本構建塊——我們第一經濟的根基。而無論是出於利潤、原則還是地區動機,對手都專注於通過不斷變化的攻擊向量贏得這場競賽。

毫無疑問,我們正在參加一場比賽。這是一場與一個無名無面的對手的比賽——這個對手決定了起跑線、道路規則以及所涉及的獎杯。既有的假設必須受到挑戰,策略必須修訂,長期以來的做法必須顛覆,以便參加這場比賽並有效競爭。

《第二經濟》突顯了一種無與倫比的應對方式,因為安全解決方案的有效性和投資回報率越來越多地以它們所促成的商業成果來衡量。

你將學到的內容:
- 理解在網絡戰爭世界中時間和信任的價值
- 使敏捷和智能的組織能夠最小化成為下一次攻擊受害者的風險
- 通過採用整體方法加快響應時間
- 消除從保護到檢測再到修正的威脅防禦生命周期中的摩擦
- 通過把握先行者優勢獲得可持續的競爭優勢
- 在開放的、集成的安全框架中部署解決方案

本書適合對象:
針對關心將商業價值賦予強大安全策略的高層IT決策者。本書還針對必須了解日益增長的網絡威脅環境的商業決策者(包括CXO、董事會成員和職能領導者),以及一般商業員工,以幫助他們理解自己如何可能成為複雜網絡戰爭中的無意參與者。