E-Book, Englisch, 286 Seiten
Gonzalez Managing Online Risk
1. Auflage 2014
ISBN: 978-0-12-420060-9
Verlag: Elsevier Science & Techn.
Format: EPUB
Kopierschutz: 6 - ePub Watermark
Apps, Mobile, and Social Media Security
E-Book, Englisch, 286 Seiten
ISBN: 978-0-12-420060-9
Verlag: Elsevier Science & Techn.
Format: EPUB
Kopierschutz: 6 - ePub Watermark
Deborah Gonzalez, Esq. is the founder of Law2sm, LLC, a legal consulting firm focusing on helping its clients navigate the legal issues relating to the new digital and social media world.Deborah graduated from New York Law School and is licensed to practice law in New York and Georgia.Deborah began her career in the corporate arena working in various positions in the information technology area - from network administrator to manager of the IS department for a top-6 CPA firm in New York City. During her tenure she managed day-to-day IT operations; designed and implemented IT-related training for employees, managers, and IT staff; developed policies and protocols for IT-corporate use; and monitored emerging trends for IT business strategies and management. Deborah used this foundation as a starting point with her legal practice, which is now transporting her beyond the Internet to the social space where the physical and digital dimensions of her clients co-exist and where she can leverage her legal expertise to their benefit. Deborah enjoys engaging with those around her - so social media is a natural fit. But it is her skill in being able to connect the dots to understand the next big paradigm shift in global communication and legal application that makes her a leader in social media and online law. Deborah serves as Chair of the GA Bar Association's Annual Program on Social Media and the Law and serves as a social media legal liaison for social media marketing companies and their clients.In addition, Deborah speaks on legal issues relating to intellectual property, social media and online legal trends and practices, and online risk management in various venues throughout the United States and abroad.Follow her on Twitter: @DGOnlineSec and @Law2sm, or visit www.managingonlinerisk.com or www.law2sm.com.
Autoren/Hrsg.
Weitere Infos & Material
1;Front Cover;1
2;Managing Online Risk;4
3;Copyright;5
4;Contents;6
5;About the Author;8
6;Online Resources;10
7;Introduction;12
8;CHAPTER 1 - RISK MANAGEMENT DIGITAL STYLE;16
8.1;RISK MANAGEMENT MODELS;18
8.2;BEST PRACTICES FOR INCIDENT RESPONSE;37
8.3;BONUS: TEN IT SECURITY MYTHS;37
8.4;SECURITY/RISK MANAGEMENT APPS;38
9;CHAPTER 2 - INTERNAL AND EXTERNAL RISKS;40
9.1;INTERNAL RISKS;41
9.2;INTERNAL RISK 1: SECURITY PERCEPTION, PRIORITY, AND BUDGET;41
9.3;INTERNAL RISK 2: TRADITIONAL AND SHADOW IT;42
9.4;INTERNAL RISK 3: MOBILE;44
9.5;INTERNAL RISK 4: PEOPLE;53
9.6;EXTERNAL RISKS;55
9.7;EXTERNAL RISK 1: TECHNOLOGY ADVANCES;56
9.8;EXTERNAL RISK 2: CLOUD STORAGE;57
9.9;EXTERNAL RISK 3: HACKING;59
9.10;EXTERNAL RISK 4: REGULATION;63
9.11;EXTERNAL RISK 5: NATURAL DISASTERS AND SQUIRRELS;67
10;CHAPTER 3 - REPUTATION AND IDENTITY;68
10.1;REPUTATION;68
10.2;REPUTATIONAL RISKS;69
10.3;DEFINING IDENTITY;70
10.4;DIGITAL IDENTITY;71
10.5;LEGAL IDENTITY;74
10.6;EXECUTIVE IDENTITY;74
10.7;CORPORATE IDENTITY: THE BRAND;79
10.8;VALUE AND WORTH OF IDENTITY;82
10.9;IDENTITY VERSUS REPUTATION;86
10.10;PROTECTING IDENTITY;89
10.11;PROTECTING REPUTATION;91
11;CHAPTER 4 - THE NEW WORKFORCE;94
11.1;EMPLOYMENT CYCLE;95
11.2;WHO IS THE WORKFORCE?;96
11.3;MILLENNIALS;98
11.4;RECRUITMENT;99
11.5;HIRING;103
11.6;EMPLOYMENT;105
11.7;TERMINATION;111
11.8;OTHER;113
12;CHAPTER 5 - BIG DATA;116
12.1;DATA CYCLE;118
12.2;DATA MANAGEMENT PLANS;120
12.3;DATA CLASSIFICATION;121
12.4;DATA ACCESS;123
12.5;DATA ANALYTICS;125
12.6;PROTECTING DATA: BACKUP;127
12.7;LOSING DATA;129
12.8;DATA RECOVERY;130
12.9;PRIVACY: TO USE OR NOT TO USE DATA DILEMMA;132
12.10;PROTECTING AGAINST LIABILITY FOR DATA/PRIVACY LOSS;135
12.11;DATA SURVEILLANCE;138
12.12;DICTATORSHIP OF DATA;139
13;CHAPTER 6 - APPROACHES TO CONTENT;142
13.1;CONTENT MARKETING VERSUS CONTENT MANAGEMENT;143
13.2;DIFFERENT AUDIENCES, DIFFERENT CONTENT;143
13.3;MYTHS OF CONTENT MARKETING AND CONTENT MANAGEMENT;144
13.4;BENEFITS OF THE CONTENT APPROACH;145
13.5;INTELLECTUAL PROPERTY RIGHTS, RISKS, AND CONTENT;146
13.6;IP CYCLE;147
13.7;COPYRIGHTS;149
13.8;DIGITAL MILLENNIUM COPYRIGHT ACT;150
13.9;FAIR USE DOCTRINE;151
13.10;INTERNATIONAL IP CONCERNS;153
13.11;CREATIVE COMMONS LICENSE;154
13.12;A COUPLE OF DIGITAL CONCERNS FOR COPYRIGHTS;155
13.13;TRADEMARKS;156
13.14;TRADEMARK AND GRIPE SITES;159
13.15;TRADEMARK AND REPUTATIONAL RISKS;161
13.16;TRADE SECRETS;161
13.17;PATENTS;162
13.18;TECHNOLOGY DEVELOPMENT;163
13.19;IP OTHER RISKS;164
13.20;IP VALUATION;166
13.21;IP LEGISLATION;166
14;CHAPTER 7 - COMPLIANCE;168
14.1;WHO NEEDS TO BE COMPLIANT?;170
14.2;GENERAL COMPLIANCE: DISCLOSURES;172
14.3;GENERAL COMPLIANCE: DISCLAIMERS;175
14.4;GENERAL COMPLIANCE: HUMAN RESOURCES;177
14.5;FINANCIAL INSTITUTIONS;179
14.6;HEALTH CARE AND MEDICAL INSTITUTIONS;185
14.7;HIGHER EDUCATION (FERPA);189
14.8;PROFESSIONAL TRADE OVERSIGHT AND ORGANIZATIONS: MOBILE;190
14.9;OTHER FEDERAL AGENCIES;191
14.10;FEDERAL LEGISLATION;192
14.11;STATE LEGISLATION;195
14.12;COMPLIANCE OVERSIGHT;197
14.13;COMPLIANCE TRAINING;199
15;CHAPTER 8 - CURRENCY AND CAMPAIGNS;200
15.1;ONLINE BANKING;202
15.2;E-PAYMENTS CONVERT TO M-PAYMENTS;205
15.3;VIRTUAL CURRENCY;206
15.4;DIGITAL CURRENCY;207
15.5;BITCOIN;208
15.6;BEYOND BITCOINS;213
15.7;CROWDFUNDING;214
15.8;ONLINE MICROFINANCING;218
15.9;ONLINE CHARITABLE DONATIONS AND FUNDRAISING;219
15.10;FUTURE OF MONEY;219
15.11;DIGITAL POLITICAL CAMPAIGNS;221
15.12;DIGITAL ADVOCACY;223
15.13;DIGITAL LOBBYING;225
15.14;RISK AND SECURITY OF ONLINE POLITICS;226
16;CHAPTER 9 - DIGITAL SUCCESSION;228
16.1;SUCCESSION PLANNING;230
16.2;INFORMATION TECHNOLOGY SECURITY SHORTAGE;233
16.3;THE NEXT GENERATION OF INFOSEC PRO;234
16.4;WOMEN IN INFOSEC;238
16.5;CYBERSECURITY SIMULATIONS;240
16.6;DIGITAL LEGACY;241
16.7;DIGITAL ASSETS;242
16.8;DIGITAL AFTERLIFE;243
16.9;DIGITAL EXPIRATION;246
16.10;DIGITAL IMMORTALITY;249
17;CHAPTER 10 - THE FUTURE OF ONLINE SECURITY;252
17.1;THE FUTURE: UNPREDICTABLE;255
17.2;THE FUTURE: FOUR SCENARIOS;257
17.3;MONITORED MAN;267
17.4;BICENTENNIAL MAN REVISITED;269
17.5;CREDENTIAL VERIFICATION;270
17.6;BIG DATA;270
18;Index;274
18.1;A;274
18.2;B;274
18.3;C;275
18.4;D;276
18.5;E;278
18.6;F;278
18.7;G;279
18.8;H;279
18.9;I;279
18.10;J;280
18.11;K;280
18.12;L;281
18.13;M;281
18.14;N;281
18.15;O;282
18.16;P;282
18.17;Q;283
18.18;R;283
18.19;S;284
18.20;T;285
18.21;U;286
18.22;V;286
18.23;W;286
18.24;Y;286
18.25;Z;286
Risk Management Digital Style
Abstract
This introductory chapter lays out the context of the book by giving an overview of risk management concepts and how they apply in a digital environment. It goes over risk management models and the risk management process.
Keywords
BlueWave computing; Critical security controls; Incident response; Models; Risk analysis; Risk assessment; Risk identification; Risk level; Risk management; Risk management apps; Risk mitigation; Risk remediation; Risk response; SANS; Security; Socially legal audit; Threat
Which risks are relevant? Those that impact business goals.
Which risks impact business goals? They all do.
Risk management models
Companies cannot eliminate all risks for two reasons. First the internal and external threats that cause risk are very dynamic. Second, control investments eventually result in diminishing returns.11




