Skip to Content

Description

Managing Risk: Technology and Communications is a practical guide to the effective management of technology and communications risks. Frequent high profile scares, like the Sasser worm and WiFi vulnerabilities, make a proactive approach essential and this book shows you how to put in place expedient checks, balances and countermeasures.


Business networks are threatened by a host of factors, from employee abuse to non-compliance with data protection and libel laws, from hacker attacks to viruses and from extortion and terrorism to natural disaster.

The costs of failing to manage systems risks can be immense and go beyond simple loss of productivity or even fraudulent losses to brand damage, theft of business secrets, expensive litigation, diminished customer confidence and adverse impacts on personnel and share value. This practical handbook includes examples, checklists and case studies to help you manage such hazards.

The book covers:
• accessibility of information;
• acceptable use of information;
• directors’ legal duties;
• general legal compliance;
• protecting networks from external and internal threats;
• encouraging security awareness at management and employee level;
• reputational risk management; and
• national and international risk and security standards.

Managing Risk: Technology and Communications is the indispensable work of reference for IT and technology managers, HR managers, IT legal advisors, company secretaries and anyone seeking practical guidance on technology risks and their management.

Contents

1. Security – why bother?
2. Risks to the network
3. Employee-related risk
4. Transaction-related risk
5. Online reputational risk
6. Other communications risk
7. Managing Operational ICT risk with standards and best practice

Name: Managing Risk (Paperback)Routledge 
Description: By Jonathan Armstrong, Mark Rhys-Jones, Daniel Dresner. Managing Risk: Technology and Communications is a practical guide to the effective management of technology and communications risks. Frequent high profile scares, like the Sasser worm and WiFi vulnerabilities, make a proactive approach essential and...
Categories: Information / Knowledge Management