Inside Jobs: Why Insider Risk Is the Biggest Cyber Threat You Can't Ignore by Payne, Joe

Inside Jobs: Why Insider Risk Is the Biggest Cyber Threat You Can't Ignore

From data security company Code42, Inside Jobs offers companies of all sizes a new way to secure...
BD$43.59 BMD
BD$43.59 BMD
SKU: 9781510764484
Product Type: Books
Please hurry! Only 0 left in stock
Author: Joe Payne
Format: Hardcover
Language: English
Subtotal: BD$43.59
10 customers are viewing this product
Inside Jobs: Why Insider Risk Is the Biggest Cyber Threat You Can't Ignore by Payne, Joe

Inside Jobs: Why Insider Risk Is the Biggest Cyber Threat You Can't Ignore

BD$43.59

Inside Jobs: Why Insider Risk Is the Biggest Cyber Threat You Can't Ignore

BD$43.59
Author: Joe Payne
Format: Hardcover
Language: English
From data security company Code42, Inside Jobs offers companies of all sizes a new way to secure today's collaborative cultures--one that works without compromising sensitive company data or slowing business down. Authors Joe Payne, Jadee Hanson, and Mark Wojtasiak, seasoned veterans in the cybersecurity space, provide a top-down and bottom-up picture of the rewards and perils involved in running and securing organizations focused on rapid, iterative, and collaborative innovation.

Modern day data security can no longer be accomplished by "Big Brother" forms of monitoring or traditional prevention solutions that rely solely on classification and blocking systems. These technologies frustrate employees, impede collaboration, and force productivity work-arounds that risk the very data you need to secure. They provide the illusion that your trade secrets, customer lists, patents, and other intellectual property are protected. That couldn't be farther from the truth, as insider threats continue to grow. These include:
  • Well-intentioned employees inadvertently sharing proprietary data
  • Departing employees taking your trade secrets with them to the competition
  • A high-risk employee moving source code to an unsanctioned cloud service

What's the solution? It's not the hunt for hooded, malicious wrongdoers that you might expect. The new world of data security is built on security acting as an ally versus an adversary. It assumes positive intent, creates organizational transparency, establishes acceptable data use policies, increases security awareness, and provides ongoing training. Whether you are a CEO, CIO, CISO, CHRO, general counsel, or business leader, this book will help you understand the important role you have to play in securing the collaborative cultures of the future.

Author: Joe Payne, Jadee Hanson, Mark Wojtasiak
Publisher: Skyhorse Publishing
Published: 10/20/2020
Pages: 192
Binding Type: Hardcover
Weight: 0.80lbs
Size: 9.30h x 6.20w x 0.80d
ISBN: 9781510764484

About the Author
Joe Payne is the president and CEO of Code42, a leading data security company that focuses on reducing the risk of data leakage from insider threats. With more than twenty years of experience as a CEO, he has a proven track record leading high growth security and technology companies. Previously, Joe served as CEO of eSecurity, Eloqua, and eGrail, and as president of iDefense. He has led some of the world's best security researchers and worked with top US government agencies to improve their risk profiles.

Jadee Hanson is the chief information security officer and chief information officer at Code42. She has more than sixteen years of information security experience and a proven track record of building IT and security programs. Prior to Code42, she held a number of senior leadership roles in security at Target Corporation and Deloitte. Jadee is also the founder of the non-profit organization Building Without Borders.

Mark Wojtasiak is the vice president of portfolio strategy and product marketing at Code42, bringing with him more than twenty years of B2B data storage, cloud, and security experience. He previously worked at Seagate for ten years, where he held a number of senior strategy roles in global marketing and product management, as well as served in marketing leadership at Now Micro.

Code42 is the leader in insider risk detection and response. Native to the cloud, Code42 rapidly detects data loss, leak, theft and sabotage as well as speeds incident response--all without lengthy deployments, complex policy management or blocking employee productivity. With Code42, security professionals can protect corporate data and reduce insider risk while fostering an open and collaborative culture for employees. www.code42.com


This title is only available via back order

Returns Policy

You may return most new, unopened items within 30 days of delivery for a full refund. We'll also pay the return shipping costs if the return is a result of our error (you received an incorrect or defective item, etc.).

You should expect to receive your refund within four weeks of giving your package to the return shipper, however, in many cases you will receive a refund more quickly. This time period includes the transit time for us to receive your return from the shipper (5 to 10 business days), the time it takes us to process your return once we receive it (3 to 5 business days), and the time it takes your bank to process our refund request (5 to 10 business days).

If you need to return an item, simply login to your account, view the order using the "Complete Orders" link under the My Account menu and click the Return Item(s) button. We'll notify you via e-mail of your refund once we've received and processed the returned item.

Shipping

We can ship to virtually any address in the world. Note that there are restrictions on some products, and some products cannot be shipped to international destinations.

When you place an order, we will estimate shipping and delivery dates for you based on the availability of your items and the shipping options you choose. Depending on the shipping provider you choose, shipping date estimates may appear on the shipping quotes page.

Please also note that the shipping rates for many items we sell are weight-based. The weight of any such item can be found on its detail page. To reflect the policies of the shipping companies we use, all weights will be rounded up to the next full pound.

Related Products

Recently Viewed Products