Skip to Main Content
Learn for Less – Enhance your auditing expertise today. Certify with confidence and save 25%. Find out more
Managing Information Security Breaches: Studies from real life

Managing Information Security Breaches - Studies from real life, 2nd Edition

SKU: 3216
Authors: Michael Krausz
Publishers: IT Governance Publishing
Format: PDF
ISBN13: 9781849285964
Pages: 199
Published: 29 Jan 2015
Availability: Always Available
Format: ePub
ISBN13: 9781849285971
Pages: 184
Published: 29 Jan 2015
Availability: Always Available

Prepare for a breach with this thought-provoking guide, which details how breaches can be treated and the
direction you should take if you’ve been affected.

Spiced with real-life incidents and breaches, this guide will inform a first-line defence for those looking to avoid
and/or minimise the destruction caused by a data breach. 

Options:
Price: £24.95
Overview

A comprehensive guide to managing an information security incident

Aligned with the international information security standard, ISO 27001:2013, this book sets out a strategic framework for handling information security incidents and breaches, including:

  • In-depth guidance for dealing with information security breaches
  • How they can be treated and what ISO 27001 can offer
  • Real-life incidents and breaches that can help you prepare for situations you may face in the future
  • Valuable lessons that your organisation can learn.

Your top priorities after a breach

What should you do first? Who should you go to? How should you handle it?

The author explains what your top priorities should be the moment you realise a breach has occurred, making this book essential reading for IT security managers, chief security officers, chief information officers and chief executive officers.

It will also be of use to personnel in non-IT roles, in an effort to make this subject more comprehensible to those who, in a worst-case scenario, will be on the receiving end of requests for six- or seven-figure excess budgets to cope with severe incidents.


By reading this guide, you’ll learn:

  • How to get your risk profile right
  • The different types of breaches
  • Avoidance and mitigation strategies
  • How small, medium-sized and large companies dealt with data breaches
  • The process of treating a data breach  

Click here to view a sample of the book

About the author

Michael Krausz

Michael Krausz is an IT expert and experienced professional investigator. He has investigated over a hundred cases of information security breaches.

Many of these cases have concerned forms of white-collar crime. Michael Krausz studied physics, computer science and law at the University of Technology in Vienna, and at Vienna and Webster universities. He has delivered over 5000 hours of professional and academic training and has provided services in eleven countries to date.

Customer Reviews

(5.00)stars out of 5
Number of reviews: 1
LEARN
FOR LESS
SAVE 25%
Loading...