Text
Cybersecurity and decision makers: data security and digital trust
Contents
1. An Increasingly Vulnerable World
1.1. The context
1.1.1. Technological disruptions and globalization
1.1.2. Data at the heart of industrial productivity
1.1.3. Cyberspace, an area without boundaries
1.1.4. IT resources
1.2. Cybercrime
1.2.1. The concept of cybercrime
1.2.2. Five types of threats
1.2.3. Five types of attackers
1.3. The cybersecurity market
1.3.1. The size of the market and its evolution
1.3.2. The market by sector of activity
1.3.3. Types of purchases and investments
1.3.4. Geographical distribution
1.4. Cyber incidents
1.4.1. The facts
1.4.2. Testimonials versus silence
1.4.3. Trends
1.4.4. Examples
1.5. Examples of particularly exposed sectors of activity
1.5.1. Cinema
1.5.2. Banks
1.5.3. Health
1.5.4. Tourism and business hotels
1.5.5. Critical national infrastructure
1.6. Responsibilities of officers and directors
2. Corporate Governance and Digital Responsibility
2.1. Corporate governance and stakeholders
2.2. The shareholders
2.2.1. Valuation of the company
2.2.2. Cyber rating agencies
2.2.3. Insider trading
2.2.4. Activist shareholders
2.2.5. The stock exchange authorities
2.2.6. The annual report
2.3. The board of directors
2.3.1. The facts
2.3.2. The four missions of the board of directors
2.3.3. Civil and criminal liability
2.3.4. The board of directors and cybersecurity
2.3.5. The board of directors and data protection
2.3.6. The statutory auditors
2.3.7. The numerical responsibility of the board of directors
2.4. Customers and suppliers
2.5. Operational management
2.5.1. The impacts of digital transformation
2.5.2. The digital strategy
2.5.3. The consequences of poor digital performance
2.5.4. Cybersecurity
2.5.5. Merger and acquisition transactions
2.5.6. Governance and data protection, cybersecurity
3. Risk Mapping
3.1. Cyber-risks
3.2. The context
3.3. Vulnerabilities
3.3.1. Fraud against the president
3.3.2. Supplier fraud
3.3.3. Other economic impacts
3.4. Legal risks
3.4.1. Class actions
3.4.2. Sanctions by the CNIL and the ICO
3.5. The objectives of risk mapping
3.6. The different methods of risk analysis
3.7. Risk assessment (identify)
3.7.1. The main actors
3.7.2. The steps
3.8. Protecting
3.9. Detecting
3.10. Reacting
3.11. Restoring
3.12. Decentralized mapping
3.12.1. The internal threat
3.12.2. Industrial risks
3.12.3. Suppliers, subcontractors and service providers
3.12.4. Connected objects
3.13. Insurance
3.14. Non-compliance risks and ethics
4. Regulations
4.1. The context
4.1.1. Complaints filed with the CNIL
4.1.2. Vectaury
4.1.3. Optical Center
4.1.4. Dailymotion.
No other version available