• Complain

Jeremy Wittkop - Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices

Here you can read online Jeremy Wittkop - Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2016, publisher: Apress, genre: Politics. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Jeremy Wittkop Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices
  • Book:
    Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices
  • Author:
  • Publisher:
    Apress
  • Genre:
  • Year:
    2016
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It clarifies the historical context of the current situation as it relates to cybersecurity, the challenges facing private business, and the fundamental changes organizations can make to better protect themselves. The problems we face are difficult, but they are not hopeless.

Cybercrime continues to grow at an astounding rate. With constant coverage of cyber-attacks in the media, there is no shortage of awareness of increasing threats. Budgets have increased and executives are implementing stronger defenses. Nonetheless, breaches continue to increase in frequency and scope.

Building a Comprehensive IT Security Program shares why organizations continue to fail to secure their critical information assets and explains the internal and external adversaries facing organizations today. This book supplies the necessary knowledge and skills to protect organizations better in the future by implementing a comprehensive approach to security.

Jeremy Wittkops security expertise and critical experience provides insights into topics such as:

  • Who is attempting to steal information and why?
  • What are critical information assets?
  • How are effective programs built?
  • How is stolen information capitalized?
  • How do we shift the paradigm to better protect our organizations?
  • How we can make the cyber world safer for everyone to do business?

Jeremy Wittkop: author's other books


Who wrote Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices? Find out the surname, the name of the author of the book and a list of all author's works by series.

Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Jeremy Wittkop 2016
Jeremy Wittkop Building a Comprehensive IT Security Program 10.1007/978-1-4842-2053-5_1
1. The Problem We Are Facing
Jeremy Wittkop 1
(1)
Boulder, Colorado, USA
A problem clearly stated is a problem half solved.
Dorothea Brande
Have you ever sat in a boardroom directly after a cyber-attack? I have, and it is a terrible experience. Chief Executive Officers (CEOs), Chief Information Security Officers (CISOs), and Chief Information Officers (CIOs) silently shake their heads and stare out the window, wondering if their lives have been destroyed by this attack. What will happen to their organization in the following months? How many people will be laid off as a result? Too many hold their head in their hands contemplating the damage to the organization they have dedicated their lives to building after a cyber-attack. As they think about the families that will be affected by the inevitable layoffs that will follow, if the organization even survives the incident, there is a central question that they ask themselves, and it is a question I have endeavored to answer over the last few years. The pursuit of the answer to this question has driven me down a path that is culminating in sharing my experiences, ideas, observations, and research in this book. Why are we failing to secure our most sensitive data?
At one time, the case could be made that there was not enough attention being paid at the highest levels of organizations in the private sector, or that not enough money was being spent by organizations to protect themselves. However, simply browsing the risk factors section of Form 10-K reports for publicly traded companies, or simply looking at the volume and profitability of cyber-security companies and products make it apparent that the challenges we face are not due to a lack of spending or awareness that danger posted by cyber-threats are clear and present. Many executives I have spoken with tell me that they continue to spend money on the problem, but attacks continue to grow in scope and prevalence. For many companies, the threat of a significant cyber-attack is nothing short of existential. If the shortcomings in Information Security initiatives are not driven by resources or will, why do our efforts continue to fall short? What can we do as a business community to protect our most critical information, convince others of the importance of Information Security initiatives, and protect executives from the electronic jungle in which so many have been maimed and mauled some to never return? As with any other problem we endeavor to solve, we must begin with a clear definition.
ThreatCon
According to the Associated Press, U.S. intelligence officials have said that cyber-crime currently trumps terrorism as the biggest threat to the countrys security. ( http://blog.trendmicro.com/cyber-attacks-considered-top-national-security-threat/ ) Take a moment to let that statement sink in. While news reports are dominated by Al Qaeda, ISIS, Hamas, and countless other terrorist groups, the largest threat to U.S. national security is cyber-crime. The problem is not limited to the United States either. In fact, the World Wide Web has removed the proximity requirement from crime. Before the globe was truly connected, if I wanted to steal your credit card, I would have to be physically close enough to you to remove the said card from your possession. Not only did that significantly limit the people that could attempt to steal that credit card, but it also limited each criminal to attempting to steal a single card at a time. Now, criminals can steal millions of credit cards and attack thousands of organizations while drinking a cup of coffee in their pajamas. Further, there is an entire illicit marketplace that exists on a part of the Internet that most people do not even know exists. This side of the Internet is sometimes referred to as the Dark Web. The Dark Web is a digital black market where all manners of illicit activity take place and stolen goods, services, and information are bought and sold. The anonymity provided by the Dark Web is one of the many ways that hackers, crackers, and programmers leverage the significant knowledge gap between them and the general public for their own personal gain. These technically savvy individuals may be operating independently or as part of a group.
Removing proximity and simultaneous attack limitations presents a major opportunity for countries, groups, or individuals who possess superior technical skills to transfer wealth from less skillful individuals who have access to financial instruments, identities, and other pieces of information that may be of value on the Dark Web. When information is stolen from a business in a certain country, it impacts every individual in that country, as individuals inside economies are interconnected.
According to McAfees Net Losses: Estimating the Global Cost of Cybercrime ( http://www.mcafee.com/us/resources/reports/rp-economic-impact-cybercrime2.pdf ) report, the United States loses about .64 percent of GDP annually to cyber-crime. In 2013, the U.S. Gross Domestic Product was $16.77 trillion, which means that approximately $107 billion dollars was lost to cyber-crime in the United States alone during that year. As a percentage of GDP, that corresponds to roughly 400,000 of the roughly 150 million jobs (According to Current Employment Statistics) that are occupied currently would be lost in a single year using the same percentage. Cyber-crime is a global problem, but there is no doubt that it affects more developed countries disproportionately. Terrorism, like the events of September 11, 2001, has a significant and lasting effect on the U.S. economy and captures attention due to the loss of life and shock value of the images of death and destruction. However, cyber-crime is far more prevalent and far more likely to directly impact an individual or organization than violent extremism or terrorism. Additionally, there is very little that individuals can do to protect themselves from a terrorist attack. With respect to terrorism, I am reminded of a saying I used to repeat to my mother when I was deployed to Iraq: Worrying is like a rocking chair, it will give you something to do, but it wont get you anywhere. This is not to say that terrorism shouldnt be a concern to the average individual, as Im sure my time in Iraq was concerning to my mother, but spending significant time worrying about circumstances outside of your control is not necessarily helpful, and can be destructive to both individuals and organizations. However, for business leaders, cyber-security is something that they can realistically defend against. As such, it is important to understand the threat landscape and take measures to protect themselves and their organizations from harm, which can be catastrophic.
From a macroeconomic perspective, the growing prevalence of cyber-crime leads to a reduction in the rewards and therefore motivation for innovation on the supply side, and a reduction in consumer confidence that results in a reduction in the demand side of the economic equation. In short, a reduction in consumer spending and a reduction in the amount of Intellectual Property generated translate to a major indirect impact to the American economy that is much more difficult to measure than the easily measurable direct impact of breaches as compared to Gross Domestic Product. Similar stories can be told about other prosperous economies and wealthy individuals throughout the world. Developing nations such as many of the growing economies in South America and portions of Africa risk emigration to other countries if they fail to protect the ideas and ability to profit from those ideas of their citizens. Such failures result in stunted economic growth and a lower quality of life for all of their citizens.
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices»

Look at similar books to Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices»

Discussion, reviews of the book Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.