What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century
Autor Shimon Brathwaiteen Limba Engleză Paperback – 16 noi 2022
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 206.37 lei 6-8 săpt. | +58.84 lei 7-13 zile |
CRC Press – 16 noi 2022 | 206.37 lei 6-8 săpt. | +58.84 lei 7-13 zile |
Hardback (1) | 388.65 lei 6-8 săpt. | |
CRC Press – 16 noi 2022 | 388.65 lei 6-8 săpt. |
Preț: 206.37 lei
Preț vechi: 315.06 lei
-34% Nou
Puncte Express: 310
Preț estimativ în valută:
39.49€ • 41.64$ • 32.88£
39.49€ • 41.64$ • 32.88£
Carte tipărită la comandă
Livrare economică 10-24 ianuarie 25
Livrare express 06-12 decembrie pentru 68.83 lei
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781032206080
ISBN-10: 103220608X
Pagini: 188
Ilustrații: 3 Tables, black and white; 8 Line drawings, black and white; 8 Illustrations, black and white
Dimensiuni: 156 x 234 x 22 mm
Greutate: 0.27 kg
Ediția:1
Editura: CRC Press
Colecția CRC Press
ISBN-10: 103220608X
Pagini: 188
Ilustrații: 3 Tables, black and white; 8 Line drawings, black and white; 8 Illustrations, black and white
Dimensiuni: 156 x 234 x 22 mm
Greutate: 0.27 kg
Ediția:1
Editura: CRC Press
Colecția CRC Press
Public țintă
ProfessionalNotă biografică
Shimon Brathwaite is author and editor-in-chief of securitymadesimple.org, a website dedicated to teaching business owners how to secure their businesses and helping cybersecurity professionals start and advance their careers. Before starting his career in Cybersecurity, Shimon was a co-op student at Ryerson University in Toronto, Canada, where he got a degree in Business Technology Management before deciding to specialize in Cybersecurity. Through his work at Ryerson University and his work after graduation, he has accumulated over 5 years of work experience in Cybersecurity across financial institutions, startups, and consulting companies. His work has primarily been in incident response and helping companies resolve security incidents, which is where he learned that most security incidents are caused by only a handful of problems. This is the premise for the book that you are about to read. If you want to continue to get cybersecurity tips and tricks for free and know when his next book comes out, please visit his website at https://www.securitymadesimple.org/, where you can find new content every week.
Cuprins
1. What Is the Cybersecurity Epidemic?
2. What Am I Defending My Company from?
3. How to Get Started with Your Cybersecurity Program.
4. Why Do You Need Cyber Insurance?
5. Compliance Regulations You Need to Be Aware of.
6. How to Be Prepared for Insider Threats.
7. How to Build an Effective Incident Response Team.
8. How to Pitch for a Quality Cybersecurity Budget.
9. Why You Need Continuous Security Validation.
10. The Importance of Routine Simulations.
11. The Six Steps to Preparing for a Cybersecurity Incident.
12. How to Analyze a Potential Cybersecurity Incident.
13. Steps to Containing a Cybersecurity Incident.
14. How to Eradicate and Recover from a Cybersecurity Incident.
15. What to Do If You Don’t Have the Internal Expertise You Need.
16. How to Handle Third-Party Vendors That Have Suffered a Data Breach.
17. How to Remove Data Leaks Once They Are on the Internet.
18. How to Address the Public During a Data Breach.
19. How to Handle Disgruntled Customers During a Data Breach.
20. When Should I Get Law Enforcement Involved?
21. Public Authorities You Should Notify Throughout a Data Breach.
2. What Am I Defending My Company from?
3. How to Get Started with Your Cybersecurity Program.
4. Why Do You Need Cyber Insurance?
5. Compliance Regulations You Need to Be Aware of.
6. How to Be Prepared for Insider Threats.
7. How to Build an Effective Incident Response Team.
8. How to Pitch for a Quality Cybersecurity Budget.
9. Why You Need Continuous Security Validation.
10. The Importance of Routine Simulations.
11. The Six Steps to Preparing for a Cybersecurity Incident.
12. How to Analyze a Potential Cybersecurity Incident.
13. Steps to Containing a Cybersecurity Incident.
14. How to Eradicate and Recover from a Cybersecurity Incident.
15. What to Do If You Don’t Have the Internal Expertise You Need.
16. How to Handle Third-Party Vendors That Have Suffered a Data Breach.
17. How to Remove Data Leaks Once They Are on the Internet.
18. How to Address the Public During a Data Breach.
19. How to Handle Disgruntled Customers During a Data Breach.
20. When Should I Get Law Enforcement Involved?
21. Public Authorities You Should Notify Throughout a Data Breach.
Descriere
This book teaches you everything that you need to know about preparing your company for a potential data breach. It is meant for the everyday business owner and makes these concepts simple to understand and apply.