The Hidden Corporation: A Data Management Security Novel

The Hidden Corporation: A Data Management Security Novel

by David Schlesinger

Paperback(TECHNICS PUBLICATIONS LLC)

$18.95
Choose Expedited Shipping at checkout for guaranteed delivery by Friday, November 29

Overview

If you wonder why good companies lose lots of personal information, and are not sure if your company is immune from this disaster, this insightful book shines a bright light on the hidden processes in most companies where data governance and information security are usually absent. These gaps are often the root cause of sensitive data loss.

Follow cybersecurity specialist Nancy MacBaron who fights in the corporate trenches against criminal hackers intent on stealing her company's sensitive information, yet discovers hidden data security gaps in her corporation while investigating a data theft.

The world’s first data security business novel is an accessible way to illuminate hidden data dangers while explaining some of the cybersecurity challenges of today.

Called into her boss's office early one morning, Nancy MacBaron is given dual assignments: one, to help locate the person who is holding their data for ransom, and two, investigate how their information management process allowed such a huge amount of sensitive information to be stolen. Amidst the rivalry among departments, and the pressure of financial disaster for the company, Nancy begins a journey of discovery that shows her a landscape of data process activity that nobody is coordinating or even really aware exists.

Nancy confers with a number of people, some helpful, some resentful of outsiders, all adding more pieces to the puzzle. Amidst the new ideas, old work habits, and personal conflicts Nancy begins to recognize hidden and ungoverned gaps within the corporation along with following clues to find the criminal before the company’s data is auctioned off to the highest bidder.



Follow Nancy as she gathers different perspectives from developers, data architects, managers, attorneys, cybersecurity specialists, data governance groups, law enforcement, and members of her own family to formulate a method to protect sensitive information that coordinates the expertise of many business groups to eliminate gaps in The Hidden Corporation.

Product Details

ISBN-13: 9781935504184
Publisher: Technics Publications, LLC
Publication date: 09/01/2011
Edition description: TECHNICS PUBLICATIONS LLC
Pages: 192
Product dimensions: 7.00(w) x 9.90(h) x 0.60(d)

About the Author

David Schlesinger has 25 years of experience in information technology and data security management. He is CISSP certified in cybersecurity and is on the Board of Directors of the Phoenix ISSA, a security professional association. David has authored two US Patents for data governance methods that use Metadata classifications to audit and automate user rights and regulatory compliance, and speaks widely at data management and security conferences. He is a Senior Security Architect and currently consults with commercial and government organizations on information protection involving enhanced Metadata, self-aware data architecture, data classification practices, and information regulatory compliance.

Table of Contents

CHAPTER 1: Crisis Uncovered 15
"C" Level Status Meeting the Next Day 18
Chief Information Security Officer's Decision 25
Nancy MacBaren 28
CHAPTER 2: Tracking Information 37
Bill the Developer Knows the Data 38
Chief Privacy Officer - Doris Diligente's Realm 43
CHAPTER 3: What is a Law? 49
Programs and Databases Fight Back 55
Policies and Regulations Everywhere 58
The CEO Meeting on Policies 64
An Unexpected Supporter 67
Nancy and Aunt Sally Classify the Kitchen 77
Second Week - No Light in the Tunnel 81
Some Classifications are Not Classifications at All 90
CHAPTER 4: Objects With Warning Labels 101
Coffee in the Dungeon with Hank 103
Basel and Nancy Stick Labels on Electrons 108
Data Analysis and Information Security Join Worldviews 114
CHAPTER 5: Toward a Solution 119
The Pace Quickens 128
Data Never Dies 134
CHAPTER 6: No News and Bad News 143
Tough Meetings and Turf Wars 153
The User That Wasn't There Logs In 159
CHAPTER 7: The CEO Conference 169
Resolution 184
The Governance Council Learns Action 185

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews