Information Security Breaches

Avoidance and Treatment based on ISO27001

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Information Security Breaches by Michael Krausz, IT Governance Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Michael Krausz ISBN: 9781849280280
Publisher: IT Governance Publishing Publication: December 15, 2009
Imprint: Language: English
Author: Michael Krausz
ISBN: 9781849280280
Publisher: IT Governance Publishing
Publication: December 15, 2009
Imprint:
Language: English
If something happens, your company needs to be ready to take prompt and decisive action to resolve the issue. This book tells you the plans and procedures you need to put in place to tackle an information security breach should it occur. In particular, the book gives you clear guidance on how to treat an information security breach in accordance with ISO27001. If a breach occurs, the evidence needs to be secured professionally. You need to know the rules on evidence gathering, and you need to be capable of isolating the suspect laptops right from the start. If you want your company to respond rapidly to an information security breach, you need to make sure that the responsibilities and roles in your company are clearly defined.
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
If something happens, your company needs to be ready to take prompt and decisive action to resolve the issue. This book tells you the plans and procedures you need to put in place to tackle an information security breach should it occur. In particular, the book gives you clear guidance on how to treat an information security breach in accordance with ISO27001. If a breach occurs, the evidence needs to be secured professionally. You need to know the rules on evidence gathering, and you need to be capable of isolating the suspect laptops right from the start. If you want your company to respond rapidly to an information security breach, you need to make sure that the responsibilities and roles in your company are clearly defined.

More books from IT Governance Publishing

Cover of the book Two-Factor Authenticaion by Michael Krausz
Cover of the book Collaborative Business Design by Michael Krausz
Cover of the book Fundamentals of Information Risk Management Auditing by Michael Krausz
Cover of the book ISO27001 in a Windows ® Environment by Michael Krausz
Cover of the book The Psychology of Information Security by Michael Krausz
Cover of the book EU GDPR: A Pocket Guide, School's edition by Michael Krausz
Cover of the book Fundamentals of Assurance for Lean Projects by Michael Krausz
Cover of the book EU-DSGVO by Michael Krausz
Cover of the book Security in the Digital World by Michael Krausz
Cover of the book The Security Consultant's Handbook by Michael Krausz
Cover of the book EU GDPR - A Pocket Guide (European) second edition by Michael Krausz
Cover of the book Agile An Executive Guide by Michael Krausz
Cover of the book Lessons Learned: Critical Information Infrastructure Protection by Michael Krausz
Cover of the book Agile Productivity Unleashed by Michael Krausz
Cover of the book No One of Us is as Strong as All of Us by Michael Krausz
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy