A Practical Process for Evaluating Your Company's Digital Security Needs--and Constructing an Effective, Affordable Defense
The powerful advantages that the World Wide Web provides for companies around the world--with its unprecedented accessibility, speed, and integration--also create powerful vulnerabilities. "Security Transformation "details how your company can limit its exposure to these risks while providing a digital environment that is conducive to expansion of its markets, growth of its business, and successful partnering with like-minded organizations.
The authors--experienced consultants at KPMG, today's global leader in e-Business consulting and solutions--show you how to construct a security environment designed to curtail undesirable intrusions, whether from external sources or from inside your own walls. "Security Transformation "provides detailed strategies to help you: Evaluate security needs, factoring in actual activity-based solutions and costs Put in place an effective response that can mitigate disruption or damage, plus identify and remedy intrusion after-effects Integrate security technologies with existing corporate systems and strategies
Your company's reputation, customer loyalty, product development, and market value depend on its ability to provide effective digital security. Let "Security Transformation "show you how to evaluate the security of your entire enterprise, produce a realistic risk profile, and establish an appropriate enterprise security environment.A survey reports that 90 percent of respondents have detected cyber attacks within the past 12 months--with the top 250 averaging nearly $1 million in losses A bored 15-year-old blocksaccess for hours to top global e-Businesses--including Amazon, eBay, E*Trade, and others--resulting in millions of dollars in lost revenue Your company's computer system is infiltrated by a disgruntled former employee, who hijacks customer credit card numbers and company records--