Summary of Security Transformation

Digital Defense Strategies to Protect Your Company's Reputation and Market Share

McGraw-Hill, more...

Buy the book

Security Transformation book summary
Network security is a means to an end, and that end is customer trust.

Rating

8 Overall

10 Applicability

8 Innovation

7 Style

Recommendation

Mary Pat McCarthy and Stuart Campbell provide just enough technical information to help you understand the electronic security risks your company faces without falling into a complete course in computer programming and Internet data transmission. The authors’ most valuable contribution is their structured plan for evaluating your computer system’s security and creating security architecture. getAbstract directs those who want a more advanced treatment of computer security issues to the book’s two appendices, which review some of the same ground in more detail. This book is an important read for CEOs and an essential resource for anyone responsible for corporate security or risk management.

In this summary, you will learn

  • How to guard your computer and Internet system against a crippling attack
  • Why most computer attacks are inside jobs
  • Why no single security solution is foolproof
 

Summary

Vandals and Thieves
Computer and Internet security issues are a fact of modern business life. The question isn’t whether the Internet is safe; the question is whether your enterprise and its Web presence are safe. Like any other neighborhood, the Internet has its risks, including vandals...
Get the key points from this book in less than 10 minutes. Learn more about our products or log in

About the Authors

Mary Pat McCarthy is vice chair of KPMG LLP and global chair of its information, communications and entertainment practice. She advises many of the world’s leading high-tech companies, and co-authored the bestseller, Digital Transformation. Stuart Campbell is national partner-in-charge of KPMG’s information risk management practice. He works with multinational clients assessing and managing a range of technology risks and concerns.


Comment on this summary

More on this topic

By the same authors

Contained in Knowledge Pack:

  • Knowledge Pack
    Security
    How to protect your company from hackers, thieves, and even terrorists.

Customers who read this summary also read

More by category