Managing Online Risk Chapter 10 Add. Resources

MP900387794

The Future of Online Security

These are resources are to help you apply some of the concepts, best practices, and lessons learned from the content in each chapter. Most of them are in addition to what are already listed in the book and serve to complement the highlighted resources in the chapters. Post in the comments others that you would recommend.

  1. CSO: Five thoughts on the future of online privacy and security as discussed on Twitter (Sept. 2013) http://www.csoonline.com/article/2136721/security-leadership/five-thoughts-on-the-future-of-online-privacy-and-security-as-discussed-on-twitt.html
  2. PBS Newshour: 15 predictions for the future of the Internet (Mar. 2014) http://www.pbs.org/newshour/rundown/15-predictions-future-internet/
  3. IBM: INFOGRAPHIC: The Future of Information Security (Aug. 2013) http://securityintelligence.com/infographic-the-future-of-information-security/#.VFvlKL4RV2Y
  4. DHS: Blueprint for a Secure Cyber Future (Mar. 2014) http://www.dhs.gov/blueprint-secure-cyber-future
  5. Forbes: The Role Of STEM Education In Shaping The Future Of Information Security (May 2014) http://www.forbes.com/sites/ciocentral/2014/05/06/the-role-of-stem-education-in-shaping-the-future-of-information-security/
  6. IGF: The Top Ten Trends in the Future of Security (2014) http://www.globalfuturist.com/about-igf/top-ten-trends/trends-in-security.html
  7. Future of Privacy Forum http://www.futureofprivacy.org
  8. WSJ: Richard Clarke on the Future of Privacy: Only the Rich Will Have It (July 2014) http://online.wsj.com/articles/richard-clarke-on-the-future-of-privacy-only-the-rich-will-have-it-1404762349

Managing Online Risk Chapter 9 Add. Resources

Digital Succession

MP900309628

These are resources are to help you apply some of the concepts, best practices, and lessons learned from the content in each chapter. Most of them are in addition to what are already listed in the book and serve to complement the highlighted resources in the chapters. Post in the comments others that you would recommend.

  1. FPA: The Importance of Digital Asset Succession Planning for Small Businesses (Sept. 2014) https://www.onefpa.org/journal/Pages/SEP14-The-Importance-of-Digital-Asset-Succession-Planning-for-Small-Businesses.aspx
  2. Fortune Magazine: Rupert Murdoch on his divorce, succession, and his empire’s future (Apr. 2014) http://fortune.com/2014/04/10/rupert-murdoch-on-his-divorce-succession-and-his-empires-future/
  3. Cures: Succession Do’s and Don’t’s (Aug. 2014) http://www.cues.org/article/view/id/Succession-Planning-Dos-and-Donts
  4. WSJ: Who Controls a Digital Legacy (Jan. 2013) http://online.wsj.com/articles/SB10001424127887324677204578188220364231346
  5. Your Digital Afterlife (Book, 2011) http://www.yourdigitalafterlife.com

Managing Online Risk Chapter 8 Add. Resources

Businesswomen Balancing Over Money

Currency and Campaigns

These are resources are to help you apply some of the concepts, best practices, and lessons learned from the content in each chapter. Most of them are in addition to what are already listed in the book and serve to complement the highlighted resources in the chapters. Post in the comments others that you would recommend.

  1. Interpol: Counterfeit currency and security documents http://www.interpol.int/Crime-areas/Financial-crime/Counterfeit-currency-and-security-documents/Currency-list
  2. American Banker: The Fine Art of Making Digital Currency Secure Video (Aug. 2014) http://www.americanbanker.com/video/the-fine-art-of-making-digital-currency-secure1069470-1.html
  3. Wired: Flaw in New ‘Secure’ Credit Cards Would Let Hackers Steal $1M Per Card (Nov. 2014) http://www.wired.com/2014/11/chip-n-pin-foreign-currency-vulnerability/
  4. Securing Your Bitcoin Wallet https://bitcoin.org/en/secure-your-wallet
  5. Terrorists on Twitter (June 2014) http://www.slate.com/articles/technology/future_tense/2014/06/isis_twitter_suspended_how_attempts_to_silence_terrorists_online_could_backfire.html
  6. Hacktivism: Means and Motivations and What Else? http://resources.infosecinstitute.com/hacktivism-means-and-motivations-what-else/
  7. Political Campaigns Targeting You Online (Nov. 2014) http://www.newsobserver.com/2014/11/01/4283911/political-campaigns-targeting.html
  8. IRS Guidance on Bitcoins and Crypto-currency http://www.irs.gov/pub/irs-drop/n-14-21.pdf

Managing Online Risk Chapter 7 Add. Resources

Reckless person

Compliance

These are resources are to help you apply some of the concepts, best practices, and lessons learned from the content in each chapter. Most of them are in addition to what are already listed in the book and serve to complement the highlighted resources in the chapters. Post in the comments others that you would recommend.

  1. Compliance Week: Compliance and Social Media: Ensuring Your Company’s Online Activity Adheres to Security and Regulatory Standards (White Paper, Oct 2014) http://www.complianceweek.com/thought-leadership/white-paper/compliance-and-social-media-ensuring-your-company’s-online-activity
  2. US News & World Report: Best Jobs of 2012: Compliance Officer http://money.usnews.com/careers/best-jobs/compliance-officer
  3. ISACA: The Top 10 Compliance Project Challenges and Opportunities  (2008) http://www.isaca.org/Journal/Past-Issues/2008/Volume-5/Pages/The-Top-10-Compliance-Project-Challenges-and-Opportunities1.aspx
  4. CSO: 7 ways to work around security compliance problems (Jan. 2014) http://www.csoonline.com/article/2134254/it-audit/7-ways-to-work-around-security-compliance-problems.html
  5. Dark Reading: Finding the Balance between Compliance and Security (Jan. 2014) http://www.darkreading.com/compliance/finding-the-balance-between-compliance-and-security/d/d-id/1113620
  6. CIO: 7 Biggest IT Compliance Headaches and How CIOs Can Cure Them (Sept. 2013) http://www.cio.com/article/2382445/compliance/7-biggest-it-compliance-headaches-and-how-cios-can-cure-them.html

Managing Online Risk Chapter 6 Add. Resources

Businessman Carrying Pile of Files

Approaches to Content

These are resources are to help you apply some of the concepts, best practices, and lessons learned from the content in each chapter. Most of them are in addition to what are already listed in the book and serve to complement the highlighted resources in the chapters. Post in the comments others that you would recommend.

  1. Managing Intellectual Property Magazine (US) http://www.managingip.com/us
  2. Creative Commons Licenses https://creativecommons.org
  3. US Copyright Office Official Website http://www.copyright.gov
  4. US Patent & Trademark Office Official Website http://www.uspto.gov
  5. World Intellectual Property Organization Website (WIPO) http://www.wipo.int/