Summary of Security Transformation

Looking for the book?
We have the summary! Get the key insights in just 10 minutes.

Security Transformation book summary
Start getting smarter:
or see our plans

Rating

8 Overall

10 Applicability

8 Innovation

7 Style


Recommendation

Mary Pat McCarthy and Stuart Campbell provide just enough technical information to help you understand the electronic security risks your company faces without falling into a complete course in computer programming and Internet data transmission. The authors’ most valuable contribution is their structured plan for evaluating your computer system’s security and creating security architecture. getAbstract directs those who want a more advanced treatment of computer security issues to the book’s two appendices, which review some of the same ground in more detail. This book is an important read for CEOs and an essential resource for anyone responsible for corporate security or risk management.

In this summary, you will learn

  • How to guard your computer and Internet system against a crippling attack;
  • Why most computer attacks are inside jobs; and
  • Why no single security solution is foolproof.
 

About the Authors

Mary Pat McCarthy is vice chair of KPMG LLP and global chair of its information, communications and entertainment practice. She advises many of the world’s leading high-tech companies, and co-authored the bestseller, Digital Transformation. Stuart Campbell is national partner-in-charge of KPMG’s information risk management practice. He works with multinational clients assessing and managing a range of technology risks and concerns.

 

Summary

Vandals and Thieves
Computer and Internet security issues are a fact of modern business life. The question isn’t whether the Internet is safe; the question is whether your enterprise and its Web presence are safe. Like any other neighborhood, the Internet has its risks, including vandals...

More on this topic

By the same authors

Risk from the CEO and Board Perspective
Risk from the CEO and Board Perspective
8

Customers who read this summary also read

The Malicious Use of Artificial Intelligence
The Malicious Use of Artificial Intelligence
8
Dark Territory
Dark Territory
8
The Hacked World Order
The Hacked World Order
9
Safety in the Cloud
Safety in the Cloud
8
The Driver in the Driverless Car
The Driver in the Driverless Car
9
Here’s How We Take Back the Internet
Here’s How We Take Back the Internet
9

Related Channels

Comment on this summary