• Contact

  • Newsletter

  • About us

  • Delivery options

  • Prospero Book Market Podcast

  • Cyber Security Culture: Counteracting Cyber Threats through Organizational Learning and Training

    Cyber Security Culture by Trim, Peter; Upton, David;

    Counteracting Cyber Threats through Organizational Learning and Training

      • GET 20% OFF

      • The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
      • Publisher's listprice GBP 150.00
      • The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.

        71 662 Ft (68 250 Ft + 5% VAT)
      • Discount 20% (cc. 14 332 Ft off)
      • Discounted price 57 330 Ft (54 600 Ft + 5% VAT)

    71 662 Ft

    db

    Availability

    Estimated delivery time: In stock at the publisher, but not at Prospero's office. Delivery time approx. 3-5 weeks.
    Not in stock at Prospero.

    Why don't you give exact delivery time?

    Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.

    Short description:

    Focusing on countermeasures against orchestrated cyber-attacks, Cyber Security Culture is research-based and reinforced with insights from experts who do not normally release information into the public arena. It will enable managers in industry and government to understand how organizational learning and training can be utilized to develop a culture that protects an organization from attacks. The authors provide information to help managers form policy and procedures, to undertake scenario-based planning and arrange appropriate training interventions, such as table top exercises. Although the work is embedded in a theoretical framework, non-technical staff will find the book accessible and it links firmly with areas beyond ICT, such as human resource management. This book will interest Government officials, policy advisors, law enforcement officers and senior managers within companies, as well as academics and students in a range of disciplines including management and computer science. The knowledge provided will appeal to an international audience.

    More

    Long description:

    Focusing on countermeasures against orchestrated cyber-attacks, Cyber Security Culture is research-based and reinforced with insights from experts who do not normally release information into the public arena. It will enable managers of organizations across different industrial sectors and government agencies to better understand how organizational learning and training can be utilized to develop a culture that ultimately protects an organization from attacks. Peter Trim and David Upton believe that the speed and complexity of cyber-attacks demand a different approach to security management, including scenario-based planning and training, to supplement security policies and technical protection systems. The authors provide in-depth understanding of how organizational learning can produce cultural change addressing the behaviour of individuals, as well as machines. They provide information to help managers form policy to prevent cyber intrusions, to put robust security systems and procedures in place and to arrange appropriate training interventions such as table top exercises. Guidance embracing current and future threats and addressing issues such as social engineering is included. Although the work is embedded in a theoretical framework, non-technical staff will find the book of practical use because it renders highly technical subjects accessible and links firmly with areas beyond ICT, such as human resource management - in relation to bridging the education/training divide and allowing organizational learning to be embraced. This book will interest Government officials, policy advisors, law enforcement officers and senior managers within companies, as well as academics and students in a range of disciplines including management and computer science.

    ’This excellent book comes at a time when cyber security is paramount in the concerns of all organisations that handle information as an asset - that should be all of us. Relying on technical threat mitigation is not enough. What is required is a change of culture and this book is a first class exemplar of how to do this though changing the way we organise ourselves and how we train to address modern threats. It is a book for everyone with an interest in safeguarding their business and their organisation.’ Neil Fisher, Vice Chairman, Information Assurance Advisory Council ’Protecting critical information infrastructure will be a vital component of business, organisational and national security in the 21st century. Cyber threats - from hacking, terrorism, sabotage or espionage - are already widespread and on the increase, yet many organisations remain poorly prepared for dealing with such attacks. Trim and Upton’s timely book takes a reasoned, well informed and practical approach to this complex topic, providing useful guidance to managers and emphasising an organisational learning approach.’ John Twigg, University College London, UK ’This is a thoughtful and practical approach to handling cyber security incidents. Incident management is fast moving requiring quick decision making which is directly dependent on knowledge and confidence. Building confidence through training and exercising is a valuable initiative.’ Bruno Brunskill, Company Secretary, Information Assurance Advisory Council (IAAC)

    More

    Table of Contents:

    Chapter 1 Introduction and Background to the Research; Chapter 2 Social Engineering; Chapter 3 Organizational Issues Relating to Critical Information Infrastructure Protection; Chapter 4 Protecting Critical Information Infrastructure: Issues and Considerations; Chapter 5 Critical Information Infrastructure: Methods of Conceptualizing Interdependencies that No One Person Fully Understands; Chapter 6 Insights into Organizational Learning; Chapter 7 Critical Information Infrastructure Road Map; Chapter 8 The Learning Organization and Managing Change; Chapter 9 Devising an Effective Counter Threat Strategy;

    More