Jump to ratings and reviews
Rate this book

Beyond Cybersecurity: Protecting Your Digital Business

Rate this book
Move beyond cybersecurity to take protection of your digital business to the next level Beyond Protecting Your Digital Business arms your company against devastating online security breaches by providing you with the information and guidance you need to avoid catastrophic data compromise. Based upon highly-regarded risk assessment analysis, this critical text is founded upon proprietary research, client experience, and interviews with over 200 executives, regulators, and security experts, offering you a well-rounded, thoroughly researched resource that presents its findings in an organized, approachable style.

Members of the global economy have spent years and tens of billions of dollars fighting cyber threats—but attacks remain an immense concern in the world of online business. The threat of data compromise that can lead to the leak of important financial and personal details can make consumers suspicious of the digital economy, and cause a nosedive in their trust and confidence in online business models.

Understand the critical issue of cyber-attacks, and how they are both a social and a business issue that could slow the pace of innovation while wreaking financial havoc Consider how step-change capability improvements can create more resilient organizations Discuss how increased collaboration within the cybersecurity industry could improve alignment on a broad range of policy issues Explore how the active engagement of top-level business and public leaders can achieve progress toward cyber-resiliency Beyond Protecting Your Digital Business is an essential resource for business leaders who want to protect their organizations against cyber-attacks.

229 pages, Kindle Edition

First published April 14, 2015

15 people are currently reading
44 people want to read

About the author

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
9 (29%)
4 stars
15 (48%)
3 stars
6 (19%)
2 stars
1 (3%)
1 star
0 (0%)
Displaying 1 - 3 of 3 reviews
Profile Image for Book Shark.
783 reviews169 followers
February 25, 2016
Beyond Cybersecurity: Protecting Your Digital Business by James M. Kaplan, Derek O'Halloran, Tucker Bailey, Alan Marcus, Chris Rezek

“Beyond Cybersecurity” is a very good book that explains why there is so much cyber insecurity and what organizations need to do to address the problem. Intended for executives but worthy of techies as well. The authors of this book are recommending a new security model based on the concept of digital resilience. This practical 327-page book includes the following nine chapters: 1. Cyber-attacks Jeopardize Companies’ Pace of Innovation, 2. It Could Get Better— or $3 Trillion Worse, 3. Prioritize Risks and Target Protections, 4. Do Business in a Digitally Resilient Way, 5. Modernize IT to Secure IT, 6. Engage Attackers with Active Defense, 7. After the Breach: Improve Incident Response across Business Functions, 8. Build a Program that Drives toward Digital Resilience, and 9. Creating a Resilient Digital Ecosystem.

Positives:
1. A professionally written book. Accessible for executives but does not insult techies.
2. The important and understated topic of Cybersecurity.
3. The book is well laid out. The straightforward prose is generously complemented with graphs, diagrams, tables and charts.
4. The authors clearly have a great command of the topic.
5. This book addresses three questions. “Risk of cyber attacks, digital resilience, and practical steps to address the problem.”
6. Clearly defines what Cybersecurity is. “Cybersecurity is first and foremost a risk management function.”
7. A description of the broader digital ecosystem.
8. The meaning behind digital resilience. “Companies understand the risks of cyber-attacks and can make business decisions where the returns justify the incremental risks.”
9. Does a very good job of demonstrating why concerns about cyber-attacks are already affecting companies’ ability to derive value from technology investments.
10. Describes effectively the cybersecurity environment over the next five to seven years. Provides models.
11. The three principles of an effective cybersecurity program.
12. The biggest challenges. “The impact of incorporating security measures is felt most keenly in cloud computing and mobile.”
13. The eight macro-drivers broken out by Intensity of Threat and Quality of Response.
14. The three specific aspects of successful information asset prioritization program: “defining the assets and risks in business terms, engaging senior business leaders, and diving deep into the long-tail risks.”
15. Goals every company should aspire. “In short, an organization needs to ensure that its IT systems provide users (internal or external) with only the minimum information necessary for them to perform their work.”
16. The six ways to embed cybersecurity into the IT environment. “1. Accelerate migration to the private cloud…”
17. Describes how to take an active defense stance against cyber attacks.
18. Describes how to handle breaches. “The U.S. Department of Defense (DoD) spends $5 billion a year on cybersecurity,1 more than anyone else, yet it recognizes that its systems are far from impregnable. Indeed, it assumes that its unclassified network will be penetrated and therefore concentrates on how to maintain day-to-day operations in the event of a breach.”
19. The questions companies must ask themselves when implementing cybersecurity programs.
20. The requirements of a resilient digital ecosystem in detail.

Negatives:
1. Repetitious.
2. I’m always leery about a book written by a committee of authors.
3. Perhaps caused by copyright, there is very little name-dropping thus reducing its appeal to the general public.
4. Straightforward to a fault.
5. You could have reduced this book 25-50% without losing its core message.
6. A glossary of key terms would have added value.

In summary, this is an effective and accessible book for executives and those in the cyber arena. The book does a good job of defining the challenges in cybersecurity and provides a practical framework to work in. A bit repetitious and lacks panache but the generous use of tables, charts, and diagrams complements the cybersecurity narrative. I recommend it!

Further recommendations: “No Ordinary Disruption” by Richard Dobbs, “Enterprise Cybersecurity” by Scott Donaldson, “Cybersecurity for Executives” by Gregory J. Touhill, “Data and Goliath” by Bruce Schneier, and “Cybersecurity and Cyberwar” by P.W. Singer.

1 review
June 2, 2018
Good read.

Provide a good summary of the holistic approach required in treating CyberSecurity as key fabric of managing digital economy both in a macro and micro levels
Profile Image for Dylan.
9 reviews
May 27, 2021
Read this book for a college course - this book does an excellent job explaining complex topics in a way non-cyber people can understand. Provides excellent detail and thorough examples.
Displaying 1 - 3 of 3 reviews

Can't find what you're looking for?

Get help and learn more about the design.