Use coupon code “SUMMER20” for a 20% discount on all items! Valid until 2024-08-31

Site Logo
Search Suggestions

      Royal Mail  express delivery to UK destinations

      Regular sales and promotions

      Stock updates every 20 minutes!

      The Second Economy: The Race for Trust, Treasure and Time in the Cybersecurity War

      1 in stock

      Firm sale: non returnable item
      SKU 9781484222287 Categories ,
      Select Guide Rating
      Gain a practical prescription for both private and public organizations to remediate threats and maintain a competitive pace to lead and thrive in an ever-shifting environment. In today’s hyper-connected, always-on era of pervasive mobility, cloud computing and intelligent...

      £32.99

      Buy new:

      Delivery: UK delivery Only. Usually dispatched in 1-2 working days.

      Shipping costs: All shipping costs calculated in the cart or during the checkout process.

      Standard service (normally 2-3 working days): 48hr Tracked service.

      Premium service (next working day): 24hr Tracked service – signature service included.

      Royal mail: 24 & 48hr Tracked: Trackable items weighing up to 20kg are tracked to door and are inclusive of text and email with ‘Leave in Safe Place’ options, but are non-signature services. Examples of service expected: Standard 48hr service – if ordered before 3pm on Thursday then expected delivery would be on Saturday. If Premium 24hr service used, then expected delivery would be Friday.

      Signature Service: This service is only available for tracked items.

      Leave in Safe Place: This option is available at no additional charge for tracked services.

      Description

      Product ID:9781484222287
      Product Form:Paperback / softback
      Country of Manufacture:US
      Title:The Second Economy
      Subtitle:The Race for Trust, Treasure and Time in the Cybersecurity War
      Authors:Author: Allison Cerra, Steve Grobman
      Page Count:238
      Subjects:Management and management techniques, Management & management techniques, Computer security, Computer security
      Description:Select Guide Rating
      Gain a practical prescription for both private and public organizations to remediate threats and maintain a competitive pace to lead and thrive in an ever-shifting environment. In today’s hyper-connected, always-on era of pervasive mobility, cloud computing and intelligent connected devices, virtually every step we take, every transaction we initiate, and every interaction we have are supported in some way by this vast global infrastructure. This set of interconnected systems comprises the fundamental building blocks of the second economy – the very foundation of our first economy. And adversaries, whether motivated by profit, principle or province, are singularly focused on winning the race through a relentless portfolio of shifting attack vectors. Make no mistake about it, we are running a race. This is a race against a faceless, nameless adversary – one that dictates the starting line, the rules of the road, and what trophies are at stake. Established assumptions must be challenged, strategies must be revised, and long-held practices must be upended to run this race and effectively compete.  The Second Economy highlights a second to none approach in this fight, as the effectiveness and ROI of security solutions are increasingly measured by the business outcomes they enable.  What You Will Learn:Understand the value of time and trust in a cyber-warfare worldEnable agile and intelligent organizations to minimize their risk of falling victim to the next attackAccelerate response time by adopting a holistic approachEliminate friction across the threat defense lifecycle, from protection to detection to correctionGain a sustainable competitive advantage by seizing first mover advantageDeploy solutions across an open, integrated security frameworkWho This Book Is For:Senior-level IT decision makers concerned with ascribing business value to a robust security strategy. The book also addresses business decision makers who must be educated about the pervasive and growing cyber threatscape (including CXOs, board directors, and functional leaders) as well as general business employees to understand how they may become unwitting participants in a complex cyber war.

      Gain a practical prescription for both private and public organizations to remediate threats and maintain a competitive pace to lead and thrive in an ever-shifting environment.

      In today''s hyper-connected, always-on era of pervasive mobility, cloud computing and intelligent connected devices, virtually every step we take, every transaction we initiate, and every interaction we have are supported in some way by this vast global infrastructure. This set of interconnected systems comprises the fundamental building blocks of the second economy - the very foundation of our first economy. And adversaries, whether motivated by profit, principle or province, are singularly focused on winning the race through a relentless portfolio of shifting attack vectors.

      Make no mistake about it, we are running a race. This is a race against a faceless, nameless adversary - one that dictates the starting line, the rules of the road, and what trophies are at stake. Established assumptions must be challenged, strategies must be revised, and long-held practices must be upended to run this race and effectively compete. 

      The Second Economy highlights a second to none approach in this fight, as the effectiveness and ROI of security solutions are increasingly measured by the business outcomes they enable.

       What You Will Learn:

      • Understand the value of time and trust in a cyber-warfare world
      • Enable agile and intelligent organizations to minimize their risk of falling victim to the next attack
      • Accelerate response time by adopting a holistic approach
      • Eliminate friction across the threat defense lifecycle, from protection to detection to correction
      • Gain a sustainable competitive advantage by seizing first mover advantage
      • Deploy solutions across an open, integrated security framework

        Who This Book Is For:

        Senior-level IT decision makers concerned with ascribing business value to a robust security strategy. The book also addresses business decision makers who must be educated about the pervasive and growing cyber threatscape (including CXOs, board directors, and functional leaders) as well as general business employees to understand how they may become unwitting participants in a complex cyber war.



        Imprint Name:APress
        Publisher Name:APress
        Country of Publication:GB
        Publishing Date:2016-10-07

        Additional information

        Weight372 g
        Dimensions158 × 234 × 13 mm