Managing Online Risk (eBook)
286 Seiten
Elsevier Science (Verlag)
978-0-12-420060-9 (ISBN)
Deborah Gonzalez, Esq. is the founder of Law2sm, LLC, a legal consulting firm focusing on helping its clients navigate the legal issues relating to the new digital and social media world.Deborah graduated from New York Law School and is licensed to practice law in New York and Georgia.Deborah began her career in the corporate arena working in various positions in the information technology area - from network administrator to manager of the IS department for a top-6 CPA firm in New York City. During her tenure she managed day-to-day IT operations; designed and implemented IT-related training for employees, managers, and IT staff; developed policies and protocols for IT-corporate use; and monitored emerging trends for IT business strategies and management. Deborah used this foundation as a starting point with her legal practice, which is now transporting her beyond the Internet to the social space where the physical and digital dimensions of her clients co-exist and where she can leverage her legal expertise to their benefit. Deborah enjoys engaging with those around her - so social media is a natural fit. But it is her skill in being able to connect the dots to understand the next big paradigm shift in global communication and legal application that makes her a leader in social media and online law. Deborah serves as Chair of the GA Bar Association's Annual Program on Social Media and the Law and serves as a social media legal liaison for social media marketing companies and their clients.In addition, Deborah speaks on legal issues relating to intellectual property, social media and online legal trends and practices, and online risk management in various venues throughout the United States and abroad.Follow her on Twitter: @DGOnlineSec and @Law2sm, or visit www.managingonlinerisk.com or www.law2sm.com.
In recent years, building a corporate online presence has become nonnegotiable for businesses, as consumers expect to connect with them in as many ways as possible. There are benefits to companies that use online technology, but there are risks as well. Managing Online Risk presents the tools and resources needed to better understand the security and reputational risks of online and digital activity, and how to mitigate those risks to minimize potential losses. Managing Online Risk highlights security and risk management best practices that address concerns such as data collection and storage, liability, recruitment, employee communications, compliance violations, security of devices (in contexts like mobile, apps, and cloud computing), and more. Additionally, this book offers a companion website that was developed in parallel with the book and includes the latest updates and resources for topics covered in the book. - Explores the risks associated with online and digital activity and covers the latest technologies, such as social media and mobile devices- Includes interviews with risk management experts and company executives, case studies, checklists, and policy samples- A website with related content and updates (including video) is also available
Front Cover 1
Managing Online Risk 4
Copyright 5
Contents 6
About the Author 8
Online Resources 10
Introduction 12
CHAPTER 1 - RISK MANAGEMENT DIGITAL STYLE 16
RISK MANAGEMENT MODELS 18
BEST PRACTICES FOR INCIDENT RESPONSE 37
BONUS: TEN IT SECURITY MYTHS 37
SECURITY/RISK MANAGEMENT APPS 38
CHAPTER 2 - INTERNAL AND EXTERNAL RISKS 40
INTERNAL RISKS 41
INTERNAL RISK 1: SECURITY PERCEPTION, PRIORITY, AND BUDGET 41
INTERNAL RISK 2: TRADITIONAL AND SHADOW IT 42
INTERNAL RISK 3: MOBILE 44
INTERNAL RISK 4: PEOPLE 53
EXTERNAL RISKS 55
EXTERNAL RISK 1: TECHNOLOGY ADVANCES 56
EXTERNAL RISK 2: CLOUD STORAGE 57
EXTERNAL RISK 3: HACKING 59
EXTERNAL RISK 4: REGULATION 63
EXTERNAL RISK 5: NATURAL DISASTERS AND SQUIRRELS 67
CHAPTER 3 - REPUTATION AND IDENTITY 68
REPUTATION 68
REPUTATIONAL RISKS 69
DEFINING IDENTITY 70
DIGITAL IDENTITY 71
LEGAL IDENTITY 74
EXECUTIVE IDENTITY 74
CORPORATE IDENTITY: THE BRAND 79
VALUE AND WORTH OF IDENTITY 82
IDENTITY VERSUS REPUTATION 86
PROTECTING IDENTITY 89
PROTECTING REPUTATION 91
CHAPTER 4 - THE NEW WORKFORCE 94
EMPLOYMENT CYCLE 95
WHO IS THE WORKFORCE? 96
MILLENNIALS 98
RECRUITMENT 99
HIRING 103
EMPLOYMENT 105
TERMINATION 111
OTHER 113
CHAPTER 5 - BIG DATA 116
DATA CYCLE 118
DATA MANAGEMENT PLANS 120
DATA CLASSIFICATION 121
DATA ACCESS 123
DATA ANALYTICS 125
PROTECTING DATA: BACKUP 127
LOSING DATA 129
DATA RECOVERY 130
PRIVACY: TO USE OR NOT TO USE DATA DILEMMA 132
PROTECTING AGAINST LIABILITY FOR DATA/PRIVACY LOSS 135
DATA SURVEILLANCE 138
DICTATORSHIP OF DATA 139
CHAPTER 6 - APPROACHES TO CONTENT 142
CONTENT MARKETING VERSUS CONTENT MANAGEMENT 143
DIFFERENT AUDIENCES, DIFFERENT CONTENT 143
MYTHS OF CONTENT MARKETING AND CONTENT MANAGEMENT 144
BENEFITS OF THE CONTENT APPROACH 145
INTELLECTUAL PROPERTY RIGHTS, RISKS, AND CONTENT 146
IP CYCLE 147
COPYRIGHTS 149
DIGITAL MILLENNIUM COPYRIGHT ACT 150
FAIR USE DOCTRINE 151
INTERNATIONAL IP CONCERNS 153
CREATIVE COMMONS LICENSE 154
A COUPLE OF DIGITAL CONCERNS FOR COPYRIGHTS 155
TRADEMARKS 156
TRADEMARK AND GRIPE SITES 159
TRADEMARK AND REPUTATIONAL RISKS 161
TRADE SECRETS 161
PATENTS 162
TECHNOLOGY DEVELOPMENT 163
IP OTHER RISKS 164
IP VALUATION 166
IP LEGISLATION 166
CHAPTER 7 - COMPLIANCE 168
WHO NEEDS TO BE COMPLIANT? 170
GENERAL COMPLIANCE: DISCLOSURES 172
GENERAL COMPLIANCE: DISCLAIMERS 175
GENERAL COMPLIANCE: HUMAN RESOURCES 177
FINANCIAL INSTITUTIONS 179
HEALTH CARE AND MEDICAL INSTITUTIONS 185
HIGHER EDUCATION (FERPA) 189
PROFESSIONAL TRADE OVERSIGHT AND ORGANIZATIONS: MOBILE 190
OTHER FEDERAL AGENCIES 191
FEDERAL LEGISLATION 192
STATE LEGISLATION 195
COMPLIANCE OVERSIGHT 197
COMPLIANCE TRAINING 199
CHAPTER 8 - CURRENCY AND CAMPAIGNS 200
ONLINE BANKING 202
E-PAYMENTS CONVERT TO M-PAYMENTS 205
VIRTUAL CURRENCY 206
DIGITAL CURRENCY 207
BITCOIN 208
BEYOND BITCOINS 213
CROWDFUNDING 214
ONLINE MICROFINANCING 218
ONLINE CHARITABLE DONATIONS AND FUNDRAISING 219
FUTURE OF MONEY 219
DIGITAL POLITICAL CAMPAIGNS 221
DIGITAL ADVOCACY 223
DIGITAL LOBBYING 225
RISK AND SECURITY OF ONLINE POLITICS 226
CHAPTER 9 - DIGITAL SUCCESSION 228
SUCCESSION PLANNING 230
INFORMATION TECHNOLOGY SECURITY SHORTAGE 233
THE NEXT GENERATION OF INFOSEC PRO 234
WOMEN IN INFOSEC 238
CYBERSECURITY SIMULATIONS 240
DIGITAL LEGACY 241
DIGITAL ASSETS 242
DIGITAL AFTERLIFE 243
DIGITAL EXPIRATION 246
DIGITAL IMMORTALITY 249
CHAPTER 10 - THE FUTURE OF ONLINE SECURITY 252
THE FUTURE: UNPREDICTABLE 255
THE FUTURE: FOUR SCENARIOS 257
MONITORED MAN 267
BICENTENNIAL MAN REVISITED 269
CREDENTIAL VERIFICATION 270
BIG DATA 270
Index 274
A 274
B 274
C 275
D 276
E 278
F 278
G 279
H 279
I 279
J 280
K 280
L 281
M 281
N 281
O 282
P 282
Q 283
R 283
S 284
T 285
U 286
V 286
W 286
Y 286
Z 286
Risk Management Digital Style
Abstract
This introductory chapter lays out the context of the book by giving an overview of risk management concepts and how they apply in a digital environment. It goes over risk management models and the risk management process.
Keywords
BlueWave computing; Critical security controls; Incident response; Models; Risk analysis; Risk assessment; Risk identification; Risk level; Risk management; Risk management apps; Risk mitigation; Risk remediation; Risk response; SANS; Security; Socially legal audit; Threat
Which risks are relevant? Those that impact business goals.
Which risks impact business goals? They all do.
Risk management models
Companies cannot eliminate all risks for two reasons. First the internal and external threats that cause risk are very dynamic. Second, control investments eventually result in diminishing returns.11
Step 1: risk identification
| Erscheint lt. Verlag | 25.9.2014 |
|---|---|
| Sprache | englisch |
| Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
| Mathematik / Informatik ► Informatik ► Web / Internet | |
| Wirtschaft ► Betriebswirtschaft / Management ► Unternehmensführung / Management | |
| Wirtschaft ► Betriebswirtschaft / Management ► Wirtschaftsinformatik | |
| ISBN-10 | 0-12-420060-5 / 0124200605 |
| ISBN-13 | 978-0-12-420060-9 / 9780124200609 |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM
Dateiformat: EPUB (Electronic Publication)
EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belletristik und Sachbüchern. Der Fließtext wird dynamisch an die Display- und Schriftgröße angepasst. Auch für mobile Lesegeräte ist EPUB daher gut geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine
Geräteliste und zusätzliche Hinweise
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich