If you wonder why good companies lose lots of personal information, and are not sure if your company is immune from this disaster, this insightful book shines a bright light on the hidden processes in most companies where data governance and information security are usually absent. These gaps are often the root cause of sensitive data loss.
Follow cybersecurity specialist Nancy MacBaron who fights in the corporate trenches against criminal hackers intent on stealing her company's sensitive information, yet discovers hidden data security gaps in her corporation while investigating a data theft.
The world’s first data security business novel is an accessible way to illuminate hidden data dangers while explaining some of the cybersecurity challenges of today.
Called into her boss's office early one morning, Nancy MacBaron is given dual assignments: one, to help locate the person who is holding their data for ransom, and two, investigate how their information management process allowed such a huge amount of sensitive information to be stolen. Amidst the rivalry among departments, and the pressure of financial disaster for the company, Nancy begins a journey of discovery that shows her a landscape of data process activity that nobody is coordinating or even really aware exists.
Nancy confers with a number of people, some helpful, some resentful of outsiders, all adding more pieces to the puzzle. Amidst the new ideas, old work habits, and personal conflicts Nancy begins to recognize hidden and ungoverned gaps within the corporation along with following clues to find the criminal before the company’s data is auctioned off to the highest bidder.
Follow Nancy as she gathers different perspectives from developers, data architects, managers, attorneys, cybersecurity specialists, data governance groups, law enforcement, and members of her own family to formulate a method to protect sensitive information that coordinates the expertise of many business groups to eliminate gaps in The Hidden Corporation.
|Publisher:||Technics Publications, LLC|
|Edition description:||TECHNICS PUBLICATIONS LLC|
|Product dimensions:||7.00(w) x 9.90(h) x 0.60(d)|
About the Author
David Schlesinger has 25 years of experience in information technology and data security management. He is CISSP certified in cybersecurity and is on the Board of Directors of the Phoenix ISSA, a security professional association. David has authored two US Patents for data governance methods that use Metadata classifications to audit and automate user rights and regulatory compliance, and speaks widely at data management and security conferences. He is a Senior Security Architect and currently consults with commercial and government organizations on information protection involving enhanced Metadata, self-aware data architecture, data classification practices, and information regulatory compliance.
Table of ContentsCHAPTER 1: Crisis Uncovered 15
"C" Level Status Meeting the Next Day 18
Chief Information Security Officer's Decision 25
Nancy MacBaren 28
CHAPTER 2: Tracking Information 37
Bill the Developer Knows the Data 38
Chief Privacy Officer - Doris Diligente's Realm 43
CHAPTER 3: What is a Law? 49
Programs and Databases Fight Back 55
Policies and Regulations Everywhere 58
The CEO Meeting on Policies 64
An Unexpected Supporter 67
Nancy and Aunt Sally Classify the Kitchen 77
Second Week - No Light in the Tunnel 81
Some Classifications are Not Classifications at All 90
CHAPTER 4: Objects With Warning Labels 101
Coffee in the Dungeon with Hank 103
Basel and Nancy Stick Labels on Electrons 108
Data Analysis and Information Security Join Worldviews 114
CHAPTER 5: Toward a Solution 119
The Pace Quickens 128
Data Never Dies 134
CHAPTER 6: No News and Bad News 143
Tough Meetings and Turf Wars 153
The User That Wasn't There Logs In 159
CHAPTER 7: The CEO Conference 169
The Governance Council Learns Action 185