You can stop stupid : (Record no. 7863)

MARC details
000 -LEADER
fixed length control field 02235nam a22002055i 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20251224105049.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 191210s2020 inu 000 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119621980
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 658.47
Item number WinY
100 1# - MAIN ENTRY--AUTHOR NAME
Personal name Winkler, Ira
245 10 - TITLE STATEMENT
Title You can stop stupid :
Remainder of title stopping losses from accidental and malicious actions /
Statement of responsibility, etc Ira Winkler
250 ## - EDITION STATEMENT
Edition statement 1 ed.
520 ## - SUMMARY, ETC.
Summary, etc Stopping Losses from Accidental and Malicious Actions Around the world, users cost organizations billions of dollars due to simple errors and malicious actions. They believe that there is some deficiency in the users. In response, organizations believe that they have to improve their awareness efforts and making more secure users. This is like saying that coalmines should get healthier canaries. The reality is that it takes a multilayered approach that acknowledges that users will inevitably make mistakes or have malicious intent, and the failure is in not planning for that. It takes a holistic approach to assessing risk combined with technical defenses and countermeasures layered with a security culture and continuous improvement. Only with this kind of defense in depth can organizations hope to prevent the worst of the cybersecurity breaches and other user-initiated losses. Using lessons from tested and proven disciplines like military kill-chain analysis, counterterrorism analysis, industrial safety programs, and more, Ira Winkler and Dr. Tracy Celaya's You CAN Stop Stupid provides a methodology to analyze potential losses and determine appropriate countermeasures to implement. * Minimize business losses associated with user failings * Proactively plan to prevent and mitigate data breaches * Optimize your security spending * Cost justify your security and loss reduction efforts * Improve your organization's culture Business technology and security professionals will benefit from the information provided by these two well-known and influential cybersecurity speakers and experts.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Technology
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term  Executive Business intelligence and security
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term  Management & public relations 
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://ieeexplore.ieee.org/servlet/opac?bknumber=9820851
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
Holdings
Withdrawn status Lost status Damaged status Home library Current library Date acquired Full call number Accession Number Bill Date/Price effective from Koha item type
      Indian Institute of Technology Tirupati Indian Institute of Technology Tirupati 24/12/2025 658.47 WinY EB00842 24/12/2025 Books