This website uses cookies. View our cookie policy
Close
United Kingdom
Select regional store:
Managing Information Security Breaches: Studies from real life

Managing Information Security Breaches - Studies from real life, 2nd Edition

SKU: 3216
Authors: Michael Krausz
Publishers: IT Governance Publishing
Format: Adobe eBook
ISBN13: 9781849285964
Pages: 199
Published: 29 Jan 2015
Availability: Always Available
Format: ePub
ISBN13: 9781849285971
Pages: 184
Published: 29 Jan 2015
Availability: Always Available
Format: Softcover
ISBN13: 9781849285957
Pages: 210
Published: 29 Jan 2015
Availability: Always Available

Prepare for a breach with this thought-provoking guide, which details how breaches can be treated and the direction you should take if you’ve been affected.

Spiced with real-life incidents and breaches, this guide will inform a first-line defence for those looking to avoid and/or minimise the destruction caused by a data breach.

What format do I need?

Options:
Price: £24.95

Description

A comprehensive guide to managing an information security incident

Aligned with the international information security standard, ISO 27001:2013, this book sets out a strategic framework for handling information security incidents and breaches, including:

  • In-depth guidance for dealing with information security breaches
  • How they can be treated and what ISO 27001 can offer
  • Real-life incidents and breaches that can help you prepare for situations you may face in the future
  • Valuable lessons that your organisation can learn.

Your top priorities after a breach

What should you do first? Who should you go to? How should you handle it?

The author explains what your top priorities should be the moment you realise a breach has occurred, making this book essential reading for IT security managers, chief security officers, chief information officers and chief executive officers.

It will also be of use to personnel in non-IT roles, in an effort to make this subject more comprehensible to those who, in a worst-case scenario, will be on the receiving end of requests for six- or seven-figure excess budgets to cope with severe incidents.

By reading this guide, you’ll learn:

  • How to get your risk profile right
  • The different types of breaches
  • Avoidance and mitigation strategies
  • How small, medium-sized and large companies dealt with data breaches
  • The process of treating a data breach

 

Understand how to manage information security breaches with this thought-provoking guide.

Buy today.


Additional information

Click here to view a sample of the book >>

 

About the Author

Michael Krausz studied physics, computer science and law at the Vienna University of Technology, Vienna University and Webster University. Over the last 20 years he has become an accomplished professional investigator, IT expert and ISO 27001 auditor, investigating over a hundred information security breaches. He has delivered over 5,000 hours of professional and academic training, and has provided consulting or investigation services in 21 countries.

Customer Reviews

(0# of Ratings:)
Loading...