Skip to Main Content
Managing Information Security Breaches: Studies from real life

Managing Information Security Breaches - Studies from real life, 2nd Edition

SKU: 3216
Authors: Michael Krausz
Publishers: IT Governance Publishing
Format: PDF
ISBN13: 9781849285964
Pages: 199
Published: 29 Jan 2015
Availability: Always Available

Prepare for a breach with this thought-provoking guide, which details how breaches can be treated and the direction you should take if you’ve been affected.

Spiced with real-life incidents and breaches, this guide will inform a first-line defence for those looking to avoid and/or minimise the destruction caused by a data breach.

Buy now, pay later! Enjoy the benefits of paying by purchase order with an IT Governance corporate account.  Apply online today or call our service centre team on 00 800 48 484 484.

Opciones:
Precio 28,95 €
Overview

A comprehensive guide to managing an information security incident

Aligned with the international information security standard, ISO 27001:2013, this book sets out a strategic framework for handling information security incidents and breaches, including:

  • In-depth guidance for dealing with information security breaches
  • How they can be treated and what ISO 27001 can offer
  • Real-life incidents and breaches that can help you prepare for situations you may face in the future
  • Valuable lessons that your organisation can learn.

Your top priorities after a breach

What should you do first? Who should you go to? How should you handle it?

The author explains what your top priorities should be the moment you realise a breach has occurred, making this book essential reading for IT security managers, chief security officers, chief information officers and chief executive officers.

It will also be of use to personnel in non-IT roles, in an effort to make this subject more comprehensible to those who, in a worst-case scenario, will be on the receiving end of requests for six- or seven-figure excess budgets to cope with severe incidents.


By reading this guide, you’ll learn:

  • How to get your risk profile right
  • The different types of breaches
  • Avoidance and mitigation strategies
  • How small, medium-sized and large companies dealt with data breaches
  • The process of treating a data breach 

Click here to view a sample of the book >>

About the author

Michael Krausz

Michael Krausz studied physics, computer science and law at the Vienna University of Technology, Vienna University and Webster University. Over the last 20 years he has become an accomplished professional investigator, IT expert and ISO 27001 auditor, investigating over a hundred information security breaches. He has delivered over 5,000 hours of professional and academic training, and has provided consulting or investigation services in 21 countries.

Opiniones de clientes

arriba
Cargando…