Waubonsee Community College

Cyber security culture, counteracting cyber threats through organizational learning and training, Peter Trim and David Upton

Label
Cyber security culture, counteracting cyber threats through organizational learning and training, Peter Trim and David Upton
Language
eng
Bibliography note
Includes bibliographical references and index
Illustrations
illustrations
Index
index present
Literary Form
non fiction
Main title
Cyber security culture
Nature of contents
bibliography
Oclc number
806993647
Responsibility statement
Peter Trim and David Upton
Series statement
Gower applied business research
Sub title
counteracting cyber threats through organizational learning and training
Summary
Cyber Security Culture is a research-based book focusing on cyber security and countermeasures against orchestrated cyber attacks. Reinforced with insights from experts who do not normally release data and information into the public arena, the book enables managers within organizations across different industrial sectors and government agencies to better understand how organizational learning and training can be utilized to develop a culture that will ultimately protect an organization from attacks. Peter trim and David Upton believe that the speed and complexity of cyber attacks demand a different approach to security management, including scenario-based planning and training, to supplement security polices and technical protection systems. The authors provide in-depth cover of issues such as how organizational learning can be used to produce cultural change that addresses the behavior of individuals as well as machines. The book provides information that will help managers to form policy to prevent cyber intrusions, to put robust security systems and procedures in place and to arrange appropriate practical interventions such as table top exercises. --from barnesandnoble.com
Table Of Contents
Introduction and background to the research -- Social engineering -- Organizational issues relating to critical information infrastructure protection -- Protecting critical information infrastructure: issues and considerations -- Critical information infrastructure: methods of conceptualizing interdependencies that no one person fully understands -- Insights into organizational learning -- Critical information infrastructure road map -- The learning organization and managing change -- Devising an effective counter threat strategy
Classification
Content
Mapped to