Cybersecurity and Third-Party Risk (notice n° 77183)

détails MARC
000 -LEADER
fixed length control field 03034cam a2200277zu 4500
003 - CONTROL NUMBER IDENTIFIER
control field FRCYB88944558
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250108001841.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250108s2021 fr | o|||||0|0|||eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119809555
035 ## - SYSTEM CONTROL NUMBER
System control number FRCYB88944558
040 ## - CATALOGING SOURCE
Original cataloging agency FR-PaCSA
Language of cataloging en
Transcribing agency
Description conventions rda
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Rasner, Gregory C.
245 01 - TITLE STATEMENT
Title Cybersecurity and Third-Party Risk
Remainder of title Third Party Threat Hunting
Statement of responsibility, etc. ['Rasner, Gregory C.']
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Name of producer, publisher, distributor, manufacturer John Wiley & Sons
Date of production, publication, distribution, manufacture, or copyright notice 2021
300 ## - PHYSICAL DESCRIPTION
Extent p.
336 ## - CONTENT TYPE
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type code c
Source rdamdedia
338 ## - CARRIER TYPE
Carrier type code c
Source rdacarrier
520 ## - SUMMARY, ETC.
Summary, etc. Move beyond the checklist and fully protect yourself from third-party cybersecurity risk Over the last decade, there have been hundreds of big-name organizations in every sector that have experienced a public breach due to a vendor. While the media tends to focus on high-profile breaches like those that hit Target in 2013 and Equifax in 2017, 2020 has ushered in a huge wave of cybersecurity attacks, a near 800% increase in cyberattack activity as millions of workers shifted to working remotely in the wake of a global pandemic. The 2020 SolarWinds supply-chain attack illustrates that lasting impact of this dramatic increase in cyberattacks. Using a technique known as Advanced Persistent Threat (APT), a sophisticated hacker leveraged APT to steal information from multiple organizations from Microsoft to the Department of Homeland Security not by attacking targets directly, but by attacking a trusted partner or vendor. In addition to exposing third-party risk vulnerabilities for other hackers to exploit, the damage from this one attack alone will continue for years, and there are no signs that cyber breaches are slowing. Cybersecurity and Third-Party Risk delivers proven, active, and predictive risk reduction strategies and tactics designed to keep you and your organization safe. Cybersecurity and IT expert and author Gregory Rasner shows you how to transform third-party risk from an exercise in checklist completion to a proactive and effective process of risk mitigation. Understand the basics of third-party risk management Conduct due diligence on third parties connected to your network Keep your data and sensitive information current and reliable Incorporate third-party data requirements for offshoring, fourth-party hosting, and data security arrangements into your vendor contracts Learn valuable lessons from devasting breaches suffered by other companies like Home Depot, GM, and Equifax The time to talk cybersecurity with your data partners is now. Cybersecurity and Third-Party Risk is a must-read resource for business leaders and security professionals looking for a practical roadmap to avoiding the massive reputational and financial losses that come with third-party security breaches.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element
700 0# - ADDED ENTRY--PERSONAL NAME
Personal name Rasner, Gregory C.
856 40 - ELECTRONIC LOCATION AND ACCESS
Access method Cyberlibris
Uniform Resource Identifier <a href="https://international.scholarvox.com/netsen/book/88944558">https://international.scholarvox.com/netsen/book/88944558</a>
Electronic format type text/html
Host name

Pas d'exemplaire disponible.

PLUDOC

PLUDOC est la plateforme unique et centralisée de gestion des bibliothèques physiques et numériques de Guinée administré par le CEDUST. Elle est la plus grande base de données de ressources documentaires pour les Étudiants, Enseignants chercheurs et Chercheurs de Guinée.

Adresse

627 919 101/664 919 101

25 boulevard du commerce
Kaloum, Conakry, Guinée

Réseaux sociaux

Powered by Netsen Group @ 2025