Want FREE Templates on Organization, Change, & Culture? Download our FREE compilation of 50+ slides. This is an exclusive promotion being run on LinkedIn.

  Please register (it's free!) or login to view the remaining preview.
If you are logged in, your referral link [?] is automatically included below.
EMBED CODE (Copy and Paste)


  1. You will get a strategy to deal with the complexity and magnitude of the cyber security issues you face.


Our objective is to provide structure and guidance to those who wish to protect themselves and their organizations from the predators that are present in cyber space. Our approach has three basic assumptions:

1. Known cyber risks are immediate and real threats. They need to be addressed and dealt with on an on-going basis. They cannot be ignored. And one must be ready to deal with the new cyber risks that arise. Unfortunately, this means you will always be playing ?catch-up' as new risks arise daily. Leading to what we call playing ?cyber wack-a-mole'.

2. If you wish to stop playing ?cyber wack-a-mole' you need to implement a parallel approach that deals with your cyber exposures and cyber security culture.

3. Many organizations, faced with resource (staff, dollars and technologies) constraints, may require a segmented approach.

We will present some thoughts on how to decide on what segments are appropriate for your organization. As part of this we will examine the following possible segments in some greater detail:

Got a question about the product? Email us at [email protected] or ask the author directly by using the form to the right. If you cannot view the preview above this document description, go here to view the large preview instead.

Source: Management Guide to Fighting Cyber Predators Word document


Management Guide to Fighting Cyber Predators

Sold by Boris Agranovich (this author has 8 documents)


Add to Cart

This business document is categorized under the function(s):

It applies to All Industries

File Type: Word (docx)

File Size: 66.2 KB

Number of Pages: 11

Related Topic(s): Cyber Security

Purchase includes lifetime product updates. After your purchase, you will receive an email to download this document.

Initial upload date (first version): Jun 13, 2017
Most recent version published: Jun 15, 2017

Ask the Author a Question

Must be logged in Click here to log in



Since 2012, we have provided best practices to over 5,000 businesses and organizations of all sizes across the world—in over 130 countries. Below is just a very small sample of our customer base.

Did you know?
The average daily rate of a McKinsey consultant is $6,625 (not including expenses). The average price of a Flevy document is $65.


15-page PDF document and supporting Word
Author: CybersecED
Excel workbook and supporting ZIP
363-slide PowerPoint deck
Author: Samir Faraj
18-slide PowerPoint deck
Author: alex


18-page Word document
Excel workbook and supporting ZIP
Excel workbook and supporting ZIP
23-slide PowerPoint deck
Excel workbook
28-slide PowerPoint deck
Excel workbook and supporting ZIP



Become your organization's resident expert on...

Digital Transformation
Post-merger Integration (PMI)
Strategy Development
Organizational Design (OD)
Performance Management
Business Transformation
Organizational Culture (OC)
Customer-centric Design (CCD)
Interested in something else? Browse our 500+ Business Toolkits of best practices, each focused on a specific management topic.