Inside Jobs: Why Insider Risk Is the Biggest Cyber Threat You Can't Ignore,New

Inside Jobs: Why Insider Risk Is the Biggest Cyber Threat You Can't Ignore,New

In Stock
SKU: DADAX1510764488
Brand: Skyhorse
Regular price$32.90
Quantity
Add to wishlist
Add to compare

Processing time: 1-3 days

US Orders Ships in: 3-5 days

International Orders Ships in: 8-12 days

Return Policy: 15-days return on defective items

Payment Option
Payment Methods

Help

If you have any questions, you are always welcome to contact us. We'll get back to you as soon as possible, withing 24 hours on weekdays.

Customer service

All questions about your order, return and delivery must be sent to our customer service team by e-mail at yourstore@yourdomain.com

Sale & Press

If you are interested in selling our products, need more information about our brand or wish to make a collaboration, please contact us at press@yourdomain.com

From data security company Code42, Inside Jobs offers companies of all sizes a new way to secure todays collaborative culturesone that works without compromising sensitive company data or slowing business down. Authors Joe Payne, Jadee Hanson, and Mark Wojtasiak, seasoned veterans in the cybersecurity space, provide a topdown and bottomup picture of the rewards and perils involved in running and securing organizations focused on rapid, iterative, and collaborative innovation.Modern day data security can no longer be accomplished by Big Brother forms of monitoring or traditional prevention solutions that rely solely on classification and blocking systems. These technologies frustrate employees, impede collaboration, and force productivity workarounds that risk the very data you need to secure. They provide the illusion that your trade secrets, customer lists, patents, and other intellectual property are protected. That couldnt be farther from the truth, as insider threats continue to grow. These include:Wellintentioned employees inadvertently sharing proprietary data Departing employees taking your trade secrets with them to the competition A highrisk employee moving source code to an unsanctioned cloud serviceWhats the solution? Its not the hunt for hooded, malicious wrongdoers that you might expect. The new world of data security is built on security acting as an ally versus an adversary. It assumes positive intent, creates organizational transparency, establishes acceptable data use policies, increases security awareness, and provides ongoing training. Whether you are a CEO, CIO, CISO, CHRO, general counsel, or business leader, this book will help you understand the important role you have to play in securing the collaborative cultures of the future.

⚠️ WARNING (California Proposition 65):

This product may contain chemicals known to the State of California to cause cancer, birth defects, or other reproductive harm.

For more information, please visit www.P65Warnings.ca.gov.

Recently Viewed