Contact us on (02) 8445 2300
For all customer service and order enquiries

Woodslane Online Catalogues

Secure by Design

A leader's guide to keeping cybercriminals out of your business
  • ISBN-13: 9781781338681
  • Publisher: RETHINK PRESS
    Imprint: RETHINK PRESS
  • By Rene-Sylvain Bedard
  • Price: AUD $46.99
  • Stock: 0 in stock
  • Availability: Book will be despatched upon release.
  • Local release date: 01/07/2025
  • Format: Paperback (216.00mm X 140.00mm) 240 pages Weight: 0g
  • Categories: Computer security [UR]
Description
Author
Biography
Table of
Contents
Google
Preview
If you think that your small or medium-sized business isn't a target for cybercrime, think again - the majority of cybera acks are against SMEs. Secure by Design is the complete guide to protecting your SME against cybercrime. It shows you how to use the proven SECURE method to identify threats, ensure your business can keep operating even while under a ack and prevent it from being targeted in the rst place. Read this book and learn how to: Survey - assess your business to understand your security weaknesses Educate - inform yourself and your sta to cultivate cybersecurity awareness Construct - devise a customized security strategy for your organization Unify - implement security protocols internally and across your 'ecosystem' of suppliers and subcontractors Review - regularly review and test your systems and processes Evolve - continually upgrade your security measures to adapt to new threats
Rene-Sylvain Bedard is a 'cyber-defender' and founder of the cybersecurity agency Indominus Managed Security, a leader in the fields of business consulting, artificial intelligence and managed security services. With a broad spectrum of clients, ranging from SMEs to governments, banks, telecommunications providers and aerospace manufacturers, Rene-Sylvain is committed to combating cybercrime worldwide, using cutting-edge technologies and innovative approaches that create a safer world where businesses and individuals can thrive without fear
Foreword - Introduction - 1 Who Needs Cybersecurity? - 2 Survey - 3 Educate - 4 Construct - 5 Unify - 6 Review - 7 Evolve - Conclusion - Notes - Resources - Acknowledgments - The Author
Google Preview content