Secure CheckoutPersonal information is secured with SSL technology.
Free ShippingFree global shipping
No minimum order.
In recent years, building a corporate online presence has become nonnegotiable for businesses, as consumers expect to connect with them in as many ways as possible. There are benefits to companies that use online technology, but there are risks as well. Managing Online Risk presents the tools and resources needed to better understand the security and reputational risks of online and digital activity, and how to mitigate those risks to minimize potential losses.
Managing Online Risk highlights security and risk management best practices that address concerns such as data collection and storage, liability, recruitment, employee communications, compliance violations, security of devices (in contexts like mobile, apps, and cloud computing), and more. Additionally, this book offers a companion website that was developed in parallel with the book and includes the latest updates and resources for topics covered in the book.
- Explores the risks associated with online and digital activity and covers the latest technologies, such as social media and mobile devices
- Includes interviews with risk management experts and company executives, case studies, checklists, and policy samples
- A website with related content and updates (including video) is also available
C-suite executives (CEO, CIO, COO, and CFO) in businesses of all sizes; risk managers, security managers, IT security managers, and business attorneys; faculty and students in business, IT, and risk management courses.
- About the Author
- Online Resources
- Chapter 1. Risk Management Digital Style
- Risk management models
- Best practices for incident response
- BONUS: ten IT security myths
- Security/risk management apps
- Chapter 2. Internal and External Risks
- Internal risks
- Internal risk 1: security perception, priority, and budget
- Internal risk 2: traditional and shadow IT
- Internal risk 3: mobile
- Internal risk 4: people
- External risks
- External risk 1: technology advances
- External risk 2: cloud storage
- External risk 3: hacking
- External risk 4: regulation
- External risk 5: natural disasters and squirrels
- Chapter 3. Reputation and Identity
- Reputational risks
- Defining identity
- Digital identity
- Legal identity
- Executive identity
- Corporate identity: The BRAND
- Value and worth of identity
- Identity versus reputation
- Protecting identity
- Protecting reputation
- Chapter 4. The New Workforce
- Employment cycle
- Who is the workforce?
- Chapter 5. Big Data
- Data cycle
- Data management plans
- Data classification
- Data access
- Data analytics
- Protecting data: backup
- Losing data
- Data recovery
- Privacy: to use or not to use data dilemma
- Protecting against liability for data/privacy loss
- Data surveillance
- Dictatorship of data
- Chapter 6. Approaches to content
- Content marketing versus content management
- Different audiences, different content
- Myths of content marketing and content management
- Benefits of the content approach
- Intellectual property rights, risks, and content
- IP cycle
- Digital Millennium Copyright Act
- Fair use doctrine
- International IP concerns
- Creative Commons license
- A couple of digital concerns for copyrights
- Trademark and gripe sites
- Trademark and reputational risks
- Trade secrets
- Technology development
- IP other risks
- IP valuation
- IP legislation
- Chapter 7. Compliance
- Who needs to be compliant?
- General compliance: disclosures
- General compliance: disclaimers
- General compliance: human resources
- Financial Institutions
- Health Care and Medical Institutions
- Higher education (FERPA)
- Professional Trade Oversight and Organizations: Mobile
- Other Federal Agencies
- Federal legislation
- State legislation
- Compliance oversight
- Compliance training
- Chapter 8. Currency and Campaigns
- Online banking
- E-payments convert to M-payments
- Virtual currency
- Digital currency
- Beyond bitcoins
- Online microfinancing
- Online charitable donations and fundraising
- Future of money
- Digital political campaigns
- Digital advocacy
- Digital lobbying
- Risk and security of online politics
- Chapter 9. Digital Succession
- Succession planning
- Information technology security shortage
- The next generation of InfoSec Pro
- Women in Infosec
- Cybersecurity simulations
- Digital legacy
- Digital assets
- Digital afterlife
- Digital expiration
- Digital immortality
- Chapter 10. The Future of Online Security
- The future: unpredictable
- The future: four scenarios
- Monitored Man
- Bicentennial man revisited
- Credential verification
- Big Data
- No. of pages:
- © Butterworth-Heinemann 2015
- 29th September 2014
- Paperback ISBN:
- eBook ISBN:
Deborah Gonzalez, Esq. is the founder of Law2sm, LLC, a legal consulting firm focusing on helping its clients navigate the legal issues relating to the new digital and social media world.
Deborah graduated from New York Law School and is licensed to practice law in New York and Georgia.
Deborah began her career in the corporate arena working in various positions in the information technology area - from network administrator to manager of the IS department for a top-6 CPA firm in New York City. During her tenure she managed day-to-day IT operations; designed and implemented IT-related training for employees, managers, and IT staff; developed policies and protocols for IT-corporate use; and monitored emerging trends for IT business strategies and management. Deborah used this foundation as a starting point with her legal practice, which is now transporting her beyond the Internet to the social space where the physical and digital dimensions of her clients co-exist and where she can leverage her legal expertise to their benefit.
Deborah enjoys engaging with those around her - so social media is a natural fit. But it is her skill in being able to connect the dots to understand the next big paradigm shift in global communication and legal application that makes her a leader in social media and online law. Deborah serves as Chair of the GA Bar Association’s Annual Program on Social Media and the Law and serves as a social media legal liaison for social media marketing companies and their clients.
In addition, Deborah speaks on legal issues relating to intellectual property, social media and online legal trends and practices, and online risk management in various venues throughout the United States and abroad.
Follow her on Twitter: @DGOnlineSec and @Law2sm, or visit www.managingonlinerisk.com or www.law2sm.com.
Attorney and founder of Law2sm, LLC, a legal consulting firm focusing on helping its clients navigate the legal issues relating to the new digital and social media world.
"Those looking for a high-level introductory approach to the topic, yet with significant tactical and practical advice, will find that Managing Online Risk is a good resource." --Security Management
Elsevier.com visitor survey
We are always looking for ways to improve customer experience on Elsevier.com.
We would like to ask you for a moment of your time to fill in a short questionnaire, at the end of your visit.
If you decide to participate, a new browser tab will open so you can complete the survey after you have completed your visit to this website.
Thanks in advance for your time.