The Second Economy : The Race for Trust, Treasure and Time in the Cybersecurity War (1st)

個数:

The Second Economy : The Race for Trust, Treasure and Time in the Cybersecurity War (1st)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 238 p.
  • 言語 ENG
  • 商品コード 9781484222287
  • DDC分類 005

Full Description

Gain a practical prescription for both private and public organizations to remediate threats and maintain a competitive pace to lead and thrive in an ever-shifting environment.

In today's hyper-connected, always-on era of pervasive mobility, cloud computing and intelligent connected devices, virtually every step we take, every transaction we initiate, and every interaction we have are supported in some way by this vast global infrastructure. This set of interconnected systems comprises the fundamental building blocks of the second economy - the very foundation of our first economy. And adversaries, whether motivated by profit, principle or province, are singularly focused on winning the race through a relentless portfolio of shifting attack vectors.

Make no mistake about it, we are running a race. This is a race against a faceless, nameless adversary - one that dictates the starting line, the rules of the road, and what trophies are at stake. Established assumptions must be challenged, strategies must be revised, and long-held practices must be upended to run this race and effectively compete. 



The Second Economy highlights a second to none approach in this fight, as the effectiveness and ROI of security solutions are increasingly measured by the business outcomes they enable.

 What You Will Learn:

Understand the value of time and trust in a cyber-warfare world

Enable agile and intelligent organizations to minimize their risk of falling victim to the next attack

Accelerate response time by adopting a holistic approach
Eliminate friction across the threat defense lifecycle, from protection to detection to correction

Gain a sustainable competitive advantage by seizing first mover advantage
Deploy solutions across an open, integrated security framework

Who This Book Is For:
Senior-level IT decision makers concerned with ascribing business value to a robust security strategy. The book also addresses business decision makers who must be educated about the pervasive and growing cyber threatscape (including CXOs, board directors, and functional leaders) as well as general business employees to understand how they may become unwitting participants in a complex cyber war.

Contents

Prologue

Chapter 1: The Second Side of the Story

Chapter 2: The Second Nature of Markets

Chapter 3: Seconding the Cause

Chapter 4: No Second Chance

Chapter 5: Second Guessing the Obvious

Chapter 6: Playing Second Fiddle

Chapter 7: Take a Second Look

Chapter 8: When Seconds Matter

Chapter 9: Second to None

Chapter 10: Cybersecurity's Second Wind

Epilogue

最近チェックした商品