Catalogue - page 34

Affiche du document Managing Cybersecurity Risk

Managing Cybersecurity Risk

Jonathan Reuvid

1h24min00

  • Informatique
  • Youscribe plus
  • Livre epub
  • Livre lcp
112 pages. Temps de lecture estimé 1h24min.
'Managing Cybersecurity Risk is a comprehensive and engrossing guide for organizations of any size’ --Infosecurity MagazineEverything you need to know to protect from and react to a cyber attackCybersecurity risk is an increasingly key topic to all those engaged in business and commerce. Widely reported and increasing incidents of cyber invasion have contributed to the growing realisation that this is an area all businesses should understand, be prepared for and know how to react when attacks occur.While larger corporates now pay close attention to defending themselves against cybersecurity infringement, small to medium businesses remain largely unaware of the scale and range of threats to their organisations.The aim of Managing Cybersecurity Risk is to provide a better understanding of the extent and scale of the potential damage that breaches of cybersecurity could cause their businesses and to guide senior management in the selection of the appropriate IT strategies, tools, training and staffing necessary for prevention, protection and response.Foreword by Baroness Pauline Neville-Jones, Chair of the Advisory Panel on Cyber Security and contributors include Don Randall, former Head of Security and CISO, the Bank of England, Ray Romero, Senior Assistant Director, Division of Information Technology at the Federal Reserve Board and Chris Gibson, Director of CERT-UK.Foreword - Rt Hon Baroness Pauline Neville-JonesContributors NotesIntroductionPart One: CYBERSECURITY – NO LONGER AN OPTION1.1 Introduction to Cybersecurity RiskBen Johnson, Sam Millar and Helen Vickers, DLA Piper UK1.2 Insight from the International IT Security CommunityCyber IQ Summer Survey1.3 You Don’t Know How Important Your Reputation Is, Until Its GoneJerome Vincent, AXELOS Global Best Practice1.4 The Cybersecurity ThreatSteve Culp and Chris Thompson, Accenture Finance & Risk Practice for Financial ServicesPart Two: INTERNATIONAL ACTION IN CYBERSECURITY2.1 International Cooperation from the Banking Sector OnwardsDon Randall, Don Randall Associates2.2 Cybersecurity Framework – Adoption by US Financial ServicesRaymond Romero2.3 Cybersecurity Support Services for UK Public and Private SectorsJonathan Reuvid, Legend Business Books2.4 EU and UK Cybersecurity DevelopmentsRoss McKean, DLA Piper UKPart Three: PREPARATION FOR YOUR BUSINESS3.1 Where Is Your Risk and How Much Will It Cost You?Steve Snaith, RSM Risk Assurance Services3.2 A Framework for CybersecuritySteve Culp and Chris Thompson, Accenture Finance & Risk Practice for Financial Services3.3 Establishing a Security Framework: A Route Map for ResilienceSam Millar and Helen Vickers, DLA Piper UK3.4 Protecting Financial Data from Insiders: Better the Devil You Know?Cyber IQ and Patrik HeuriPart Four: PREVENTION4.1 Turning Your People into Your Most Effective Defence: A New ApproachNick Wilding, AXELOS Global Best Practice4.2 Making Your Enterprise Cyber ResilientSteve Culp, Chris Thompson and Jon Narveson, Accenture Finance & Risk Practice for Financial Services4.3 Cyber Risk Measures for Financial ServicesDr. Peter Mitic, Banco Santander4.4 Countermeasures to Advanced ThreatsNick Ioannou, Boolean LogicalPart Five: PROTECTION AND RESPONSE5.1 Managing Cyber Incidents and Internal Security BreachesJulian Cracknell, BAE Systems Applied Intelligence5.2 Everyone Thinks They Have a Plan Until They’re Punched in the Face….Kevin Duffey, Cyber Rescue Alliance5.3 Managing a Cyber Incident: Best PracticeSam Millar and Helen Vickers, DLA Piper UK5.4 Preparing for Cybersecurity Turbulence and Further ThreatsSteve Culp, Chris Thompson and John Narveson, Accenture Finance & Risk Practice for Financial Services5.5 Reviewing and Updating Contingency PlansRichard Preece, OakasAppendix Contributors contacts
Accès libre
Affiche du document Easy Steps to Managing Cybersecurity

Easy Steps to Managing Cybersecurity

1h41min15

  • Informatique
  • Youscribe plus
  • Livre epub
  • Livre lcp
135 pages. Temps de lecture estimé 1h41min.
An introductory guide to managing cybersecurity for businesses. How to prevent, protect and respond to threats.Providing an insight to the extent and scale a potential damage could cause when there is a breech in cyber security.  It includes case studies and advice from leading industry professionals, giving you the necessary strategies and resources to prevent, protect and respond to any threat:Introduction to cyber securitySecurity frameworkSupport services for UK public and private sectorsCyber security developmentsRouting a map for resilienceProtecting financial dataCountermeasures to advance threatsManaging incidents and breachesPreparing for further threatsUpdating contingency plansFOREWORDNot so long ago, looking after national security was an exclusive government responsibility. The digital age has changed that – and permanently. These days it is not just the organs of the state and its infrastructure which are the direct object of cyberattack, it is also the private sector, and at all levels. Individuals and corporate entities have of course always been expected to take reasonable precautions against crime but in the past they have not been called upon to be active players in helping create the framework for secure conditions. But as the private sector is both victim and solutions provider, partnership with government in combatting cyber predators on the economy and security of the nation has become essential. Indeed, it is not too much to say that good cybersecurity and cyber resilience have become a duty for the corporate sector to which these essays are addressed.  But, as the authors point out, not everyone has got the message. As three of them put it: “there is a schism between the reality of cybersecurity risk and the number of businesses engaging sufficiently seriously with the threat”. Better reporting of breaches may account for some of the estimated rise in the huge losses attributable to cyber crime but, however one reads the figures, there is only one conclusion to draw: we are currently losing the battle. The types of actors, their motives and their modus operandi vary, but they all have the following features in common: stealth in breaking in, difficulty of detection and attribution and, in consequence, a high likelihood of success at low cost.
Accès libre
Affiche du document Conquer the Web

Conquer the Web

Nick Wilding

1h17min15

  • Informatique
  • Youscribe plus
  • Livre epub
  • Livre lcp
103 pages. Temps de lecture estimé 1h17min.
This is the ultimate guide to protect your data on the web. From passwords to opening emails, everyone knows what they should do but do you do it?'A must read for anyone looking to upskill their cyber awareness,' Steve Durbin, Managing Director, Information Security ForumTons of malicious content floods the internet which can compromise your system and your device, be it your laptop, tablet or phone.How often do you make payments online? Do you have children and want to ensure they stay safe online? How often do you sit at a coffee shop and log onto their free WIFI? How often do you use social media on the train or bus? If you believe using an antivirus software will keep devices safe... you are wrong. This book will guide you and provide solutions to avoid common mistakes and to combat cyber attacks.This Guide covers areas such as:Building resilience into our IT LifestyleOnline IdentityCyber Abuse: Scenarios and StoriesProtecting DevicesDownload and shareGaming, gamble and travelCopycat websitesI Spy and QR CodesBanking, apps and PasswordsIncludes chapers from Nick Wilding, General Manager at AXELOS, Tim Mitchell, Content Director at Get Safe Online, Maureen Kendal, Director at Cybercare, Nick Ioannou, Founder of Boolean Logical, and CYBERAWARE.'Conquer the Web is a full and comprehensive read for anyone wanting to know more about cyber-security. It takes it time to explain the many acronyms and jargon that are associated with our industry, and goes into detail where necessary.' Sarah Jane MD of Layer8 Ltd'Online fraud, cyber bullying, identity theft and these are the unfortunate by products of the cyber age. The challenge is how do we protect ourselves in the online world? Conquer the Web provides practical guidance in an easy to understand language that allows readers to take a small number of steps that will greatly increase their online security. A must read for anyone looking to upskill their cyber awareness.' Steve Durbin MD of Information Security Forum Limited
Accès libre
Affiche du document Engaging Researchers with Data Management

Engaging Researchers with Data Management

Joanne Yeomans

1h03min00

  • Informatique
  • Youscribe plus
  • Livre epub
  • Livre lcp
84 pages. Temps de lecture estimé 1h03min.
Effective Research Data Management (RDM) is a key component of research integrity and reproducible research, and its importance is increasingly emphasised by funding bodies, governments, and research institutions around the world. However, many researchers are unfamiliar with RDM best practices, and research support staff are faced with the difficult task of delivering support to researchers across different disciplines and career stages. What strategies can institutions use to solve these problems?Engaging Researchers with Data Management is an invaluable collection of 24 case studies, drawn from institutions across the globe, that demonstrate clearly and practically how to engage the research community with RDM. These case studies together illustrate the variety of innovative strategies research institutions have developed to engage with their researchers about managing research data. Each study is presented concisely and clearly, highlighting the essential ingredients that led to its success and challenges encountered along the way. By interviewing key staff about their experiences and the organisational context, the authors of this book have created an essential resource for organisations looking to increase engagement with their research communities.This handbook is a collaboration by research institutions, for research institutions. It aims not only to inspire and engage, but also to help drive cultural change towards better data management. It has been written for anyone interested in RDM, or simply, good research practice.
Accès libre
Affiche du document La digitalisation apprivoisée : au service de l'humain et de la performance durable

La digitalisation apprivoisée : au service de l'humain et de la performance durable

Henri Savall

4h42min00

  • Informatique
  • Youscribe plus
  • Livre epub
  • Livre lcp
  • Livre mobi
376 pages. Temps de lecture estimé 4h42min.
Cet ouvrage permet de soulever les nombreuses questions et observations sur les impacts du digital dans les entreprises et sur le management qui font apparaître que l’humain est au cœur de cette transformation avec de nouvelles relations clients et relations internes. Le digital remet en cause les compétences de chacun et l’organisation de tous. Le rôle du manager et de l’équipe dirigeante est essentiel pour accompagner cette évolution. La 30e édition du Colloque d’Automne de l’ISEOR rassemble un large éventail d’acteurs concernés par les enjeux de la prospérité, du management comme source de création de valeur socio-économique et de développement humain : iaelyon, SEAM Institute (États-Unis), St. Scholastica College (États-Unis), Université de Fribourg (Suisse), Université Grenoble-Alpes, Université Jean Moulin Lyon 3, Université de Málaga (Espagne). L’ouvrage met aussi en évidence, par de nombreux témoignages internationaux de dirigeants, cadres d’entreprises industrielles, tertiaires et d’organisations de service public, l’efficacité et l’efficience du management socio-économique, implanté avec succès depuis plus de 42 ans. Les témoins de ces actions innovantes sont représentés par : Actalians, Ad’minima Arbor & Sens, Akuiteo, Association Le Prado, Attestation Légale, Cabinet Fourmann et Peuchot Avocats, Capidev, Cars Berthelet, Cavatello, Chambre de Commerce et d’Industrie de Lyon, Cetaf, Ciril Group, Delta Service Location, Dimo Software, E-Guilde, Elcom, Empaque San José (Mexique), Esker, Eurotab, Fondation Aigues-Vertes (Suisse), Groupe Brioche Pasquier, IDSA, INES CRM, Lamy Lexel, Lumiplan Montagne, MEDEF, Obiz Concept, Office Method Statement, One Soul Consultoría (Mexique), Petzl, Philometis, Sánchez Aguacates Hass (Mexique), SLB Médical, Smart Building Alliance, Société des Missions Africaines, Société Kassab (Liban), Soly Import, St. Croix Regional Medical Center (États-Unis), Visiativ, Woonoz. Le concept de management socio-économique, né en Europe, est largement publié aux États-Unis, où son originalité a été reconnue par l’Academy of Management.
Accès libre
Affiche du document Development Program Monitoring and Evaluation System Effectiveness

Development Program Monitoring and Evaluation System Effectiveness

Abdourahmane Ba

1h39min00

  • Informatique
  • Youscribe plus
  • Livre epub
  • Livre lcp
  • Livre mobi
132 pages. Temps de lecture estimé 1h39min.
This book is a contribution to the building of a knowledge base for the effectiveness of M&E-Systems in the field of development management. The primary focus is to contribute to the clarification of what rigorous frameworks would apply to understand and meaningfully measure M&E-System effectiveness. The book has the aim of translating outcomes from Dr. Ba’s thesis research on M&E-System effectiveness into an actionable contribution to better reach development practitioners and managers. The book is mainly devoted to development managers and M&E experts who wish to find superior ways of managing M&E-Systems for improved decision-making and measured risk-taking in moving development policies and programs towards the greater freedom and welfare of people mainly in Africa. The book focuses on M&E-System effectiveness and how it influences the dynamic capabilities of development organizations and institutions in managing development programs and projects. The book presents the challenges in seeking an effective M&E-System, examines the gaps and limits in assessing it, and finally proposes ways to rigorously measure its effectiveness. The book may also contribute to the scientific and professional discussions on what would be the meaningful framework to better understand the success factors that underlie an effective M&E-System and also how they help improve development management.
Accès libre
Affiche du document Big Brother is driving you. Brèves réflexions d'un informaticien obtus sur la société à venir

Big Brother is driving you. Brèves réflexions d'un informaticien obtus sur la société à venir

Hugues BERSINI

38min15

  • Informatique
  • Youscribe plus
  • Livre epub
  • Livre lcp
  • Livre mobi
51 pages. Temps de lecture estimé 38min.
2e édition, revue. L’informatique seule est capable d’apporter les solutions qui s’imposent derechef à la complexification du monde et la multiplication des menaces écologiques, économiques et sociétales. La virtualisation de toute information, la multiplication des modes de connexion, la transformation de tout objet en un ordinateur rendent possible la prise en charge totalement automatisée de nos biens publics. Après-demain, des transports en commun impossibles à frauder optimiseront le trafic pour un coût écologique minimum, des senseurs intelligents s’assureront d’une consommation énergétique sobre, les contrats financiers et autres ne souffriront d’aucune défection possible et des algorithmes prédictifs préviendront toute activité criminelle. Face à l’urgence, nous accepterons de confier notre société aux mains d’un big brother « bienveillant ». L’interdit le deviendra vraiment et la privation remplacera la punition. Mais le souhaitons-nous vraiment ? Hugues Bersini est professeur d’informatique à l’Université libre de Bruxelles et directeur du laboratoire d’intelligence artificielle de cette même université. Ses travaux de recherche couvrent l’intelligence artificielle, la bioinformatique, le génie logiciel, les systèmes complexes et les sciences cognitives.
Accès libre
Affiche du document Excel 2019

Excel 2019

Michel Martin Mediaforma

1h33min00

  • Informatique
  • Youscribe plus
  • Livre epub
  • Livre lcp
  • Livre mobi
124 pages. Temps de lecture estimé 1h33min.
Ce livre sur Excel 2019 est destinée à un public débutant. Par son intermédiaire, vous allez acquérir les mécanismes qui vous rendront efficace et professionnel dans Excel 2019. Que vous désiriez découvrir ou approfondir vos connaissances sur la dernière version du tableur de Microsoft, cet ouvrage est fait pour vous ! Au fil des pages, vous découvrirez entre autres comment : Créer des feuilles de calcul et y saisir des données Mettre en forme les cellules en fonction de leur type et de leur contenu Utiliser le presse-papiers évolué d'Office 2019 Créer des listes personnalisées Utiliser la fonctionnalité Remplissage instantané d'Excel Insérer des icônes SVG et des objets 3D dans vos feuilles de calcul Représenter vos données numériques par des graphiques de tous types Créer et utiliser des macros pour faciliter les traitements complexes ou répétitifs Créer des tableaux croisés dynamiques et des graphiques croisés dynamiques Utiliser des compléments pour ajouter des fonctionnalités à Excel Effectuer des consolidations et utiliser le solveur Importer des données externes issues d'une base de données Rendre vos classeurs accessibles pour les malvoyants Effectuer des prévisions et tendances en un clic Qui est l'auteur ? Michel Martin est ingénieur en informatique, auteur de très nombreux ouvrages et MVP (Microsoft Most Valuable Professional) depuis 2004. Il reste à votre disposition dans le salon d'entraide pour répondre à vos éventuelles questions sur cette formation.
Accès libre

...

x Cacher la playlist

Commandes > x
     

Aucune piste en cours de lecture

 

 

--|--
--|--
Activer/Désactiver le son