MARC details
000 -LEADER |
fixed length control field |
03277cam a2200349 i 4500 |
001 - CONTROL NUMBER |
control field |
21112664 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
KE-NaKCAU |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20231206104910.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
190723s2020 mau 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2019025243 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781633697997 |
Qualifying information |
(hardback) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
Cancelled/invalid ISBN |
9781633697997 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
MH/DLC |
Language of cataloging |
eng |
Transcribing agency |
KE-NaKCAU |
Description conventions |
rda |
Modifying agency |
DLC |
042 ## - AUTHENTICATION CODE |
Authentication code |
pcc |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.A25 |
Item number |
P375 2020 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
23 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Parenty, Thomas J., |
245 12 - TITLE STATEMENT |
Title |
A leader's guide to cybersecurity : |
Remainder of title |
why boards need to lead--and how to do it / |
Statement of responsibility, etc |
Thomas J. Parenty, Jack J. Domet. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Boston : |
Name of publisher, distributor, etc |
Havard Business Review, |
Date of publication, distribution, etc |
2019. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
viii, 218 p. : |
Dimensions |
25 cm |
500 ## - GENERAL NOTE |
General note |
Includes index. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Introduction: Digital stewardship -- Part 1. The problems: Misleading platitudes -- Hidden dynamics -- Misguided voices -- Part 2. The principles: If you don't understand it, they didn't explain it -- It is the business at risk -- Make cybersecurity mainstream -- Engage motivation -- Part 3. The foundation: Manage cyber risks -- Fortify the company -- Lead in crisis -- Part 4. The aides: Aide mémoire: manage cyber risks -- Aide mémoire: fortify the company -- Aide mémoire: lead in crisis. |
520 ## - SUMMARY, ETC. |
Summary, etc |
"Companies are investing an unprecedented amount of money to keep their data and assets safe, yet cyberattacks are on the rise--and the problem is worsening. No amount of technology, resources, or policies will reverse this trend. Only sound governance, originating with the board, can turn the tide. Protection against cyberattacks can't be treated as a problem solely belonging to an IT or cybersecurity department. It needs to cast a wide and impenetrable net that covers everything an organization does--from its business operations, models, and strategies to its products and intellectual property. And boards are in the best position to oversee the needed changes to strategy and hold their companies accountable. Not surprisingly, many boards aren't prepared to assume this responsibility. In A Leader's Guide to Cybersecurity, Thomas Parenty and Jack Domet, who've spent over three decades in the field, present a timely, clear-eyed, and actionable framework that will empower senior executives and board members to become stewards of their companies' cybersecurity activities. This includes: Understanding cyber risks and how best to control them Planning and preparing for a crisis--and leading in its aftermath Making cybersecurity a companywide initiative and responsibility Drawing attention to the nontechnical dynamics that influence the effectiveness of cybersecurity measures Aligning the board, executive leadership, and cybersecurity teams on priorities Filled with tools, best practices, and strategies, A Leader's Guide to Cybersecurity will help boards navigate this seemingly daunting but extremely necessary transition"-- |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security. |
9 (RLIN) |
458 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Boards of directors. |
9 (RLIN) |
2158 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Organizational behavior. |
9 (RLIN) |
80 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Business planning. |
9 (RLIN) |
79 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Domet, Jack J., |
Relator term |
author. |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
orignew |
d |
1 |
e |
ecip |
f |
20 |
g |
y-gencatlg |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Library of Congress Classification |
Koha item type |
Books |