Cyber Security: Law and Guidance
Autor Helen Wong MBEen Limba Engleză Paperback – 26 sep 2018
Preț: 928.22 lei
Preț vechi: 1148.64 lei
-19% Nou
Puncte Express: 1392
Preț estimativ în valută:
177.64€ • 184.52$ • 147.56£
177.64€ • 184.52$ • 147.56£
Carte disponibilă
Livrare economică 13-27 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781526505866
ISBN-10: 152650586X
Pagini: 792
Dimensiuni: 156 x 248 x 41 mm
Greutate: 1.23 kg
Editura: Bloomsbury Publishing
Colecția Bloomsbury Professional
Locul publicării:London, United Kingdom
ISBN-10: 152650586X
Pagini: 792
Dimensiuni: 156 x 248 x 41 mm
Greutate: 1.23 kg
Editura: Bloomsbury Publishing
Colecția Bloomsbury Professional
Locul publicării:London, United Kingdom
Caracteristici
A first port of call for legal practitioners including solicitors, barristers, in-house counsel, data protection compliance officers as well as company directors, finance directors and HR directors/professionals who find themselves faced with cyber security and data protection/management issues.
Notă biografică
General EditorHelen Wong, MBE is a corporate commercial lawyer with Clarke Willmott Solicitors and works with their IP team who are specialists in cyber security and IP law. Previously Helen was with Clifford Chance (London and Hong Kong), PricewaterhouseCoopers and Walkers in the Cayman Islands. Helen frequently speaks and writes about topical legal issues including Brexit, cybersecurity and China. She is also the author of the book, Doing Business After Brexit: A Practical Guide to the Legal Changes (Bloomsbury Professional, August 2017). She is also a recipient of Her Majesty's Member of the British Empire (MBE).
Cuprins
Chapter 1. Threats - Melanie Oldham and Abigail McAlpine (with "Script Kiddies" by Gary Broadfield)Chapter 2. Vulnerabilities - Melanie Oldham and Abigail McAlpineChapter 3. The Law - Ria Halme (with "Territorial Scope" by Gary Broadfield)Chapter 4. How to Defend - Graeme BatsmanChapter 5. Privacy and Security in The Workplace - Ria HalmeChapter 6. Security in The Built Environment - Nathan JonesChapter 7. The Importance of Policy and Guidance in Digital Communications - Ben SilverstoneChapter 8. The C Suite Perspective on Cyber Risk - Klaus JulischChapter 9. Corporate Governance Mind Map - Andrew ConstantineChapter 10. Industry Specialists In-Depth Reports- Mobile Payments - Rhiannon Lewis- Electric Utilities: Critical Infrastructure Protection and Reliability - E. Rudina and S. Kort- Manufactuting - Filippo Mauri- Think Money Group and UK Financial Services - Steven Peacock- Towards Ennergy 4.0 - Stefano Bracco- Aerospace, Defence and Security Sector - Simon Goldsmith- Banking - in the Emirates - Yazid Khandhadia- Healthcare - Helen Wong MBE- Medical Devices - Helen Wong MBEChapter 11. Social Media and Cyber Security - Susan HallChapter 12. International Law and Interaction Between States - Dr Benjamin AngChapter 13. Security Concerns with The Internet of Things - Kevin CurranChapter 14. Managing Cyber-Security in An International Financial Institution - Cosimo PaccianiChapter 15. Employee Liability and Protection - Sally PenniChapter 16. Data Security - The New Oil - Ryan MackieChapter 17. Data Classification - Reza AlviChapter 18. Liability Following A Data Breach - Mark DeemChapter 19. Criminal Law - Jill Lorimer and William ChristopherChapter 20. The Digital Next Way - Mark BlackhurstChapter 21. Intelligence and The Monitoring of Everyday Life - Dr Victoria Wang and Professor John V. TuckerChapter 22. Collaboration: Results? - David ClarkeChapter 23. Cybersecurity: The Cause and The Cure - Kevin MurphyChapter 24. Mergers and Acquisitions Corporate Due Diligence and Cyber Security Issues - Vijay RathourChapter 25. Protecting Organisations - Gary HibberdChapter 26. Public Private Partnerships - E. RudinaChapter 27. Behavioural Science in Cyber Security - Leron ZinatullinChapter 28. Agile Cyber Security Process Capability - Lanre RotimiChapter 29. Cyber Secret, Life Secrets - On the Verge of Human Science - Arthue KeletiChapter 30. A Plan for the SME - William McBorroughChapter 31. Conclusion - Helen Wong MBEAppendix 1 Theresa May Speech, Munich Security Conference, February 2018Appendix 2 Cyber-Security Lexicon for Converged SystemsAppendix 3 The Government's National ResponseAppendix 4 Sample Legal Documents
Recenzii
...offers unparalleled insight into the development of cyber security and countermeasures against cyber attacks...as useful for legal practitioners as it will be for DPOs and cyber security practitioners as they seek to understand the latest developments in cyber security and data protection in the European Union and the United Kingdom, and look to create robust security frameworks that will be so essential if they are to stay competitive and influential in a constantly changing technology landscape