This book bridges the gap between complex technical language and business objectives to create a security-first review of the security and compliance landscapes. It has practical solutions for businesses to create "cybersustainable" security-focused policies, processes, and controls to protect todayâ s future for tomorrowâ s digital ecosystem.
This book bridges the gap between complex technical language and business objectives to create a security-first review of the security and compliance landscapes. It has practical solutions for businesses to create "cybersustainable" security-focused policies, processes, and controls to protect todayâ s future for tomorrowâ s digital ecosystem.
Karen Walsh passed the Connecticut Bar in 2004. She then worked as a Bank Secrecy Act internal auditor and contract compliance manager for fourteen years before discovering her passion for cybersecurity and privacy compliance. She spent eleven years teaching first-year college writing and applies many of the same pedagogical approaches to writing about information security. The ISACA Journal published her coauthored pieces on cybersustainability in 2019. Her book 100 Geek Heroines was published by ABC-CLIO, part of Bloomsbury, in October 2019, and she has also authored chapters in At Home in the Whedonverse (MacFarland, 2017) and Transmediating the Whedonverse (Springer, 2019).
Inhaltsangabe
Chapter 1 Into the Mind of a Malicious Actor Chapter 2 Reviewing the Compliance Landscape Chapter 3 Compliance Risk Chapter 4 Looking at Risk through a Security Lens Chapter 5 How to Set Controls Chapter 6 Continuous Monitoring Chapter 7 Vendor Risk Management: Securing the Supply Chain Chapter 8 Calculating the Total Cost of Compliance Chapter 9 Information Security Audit: The What, How, and Why Chapter 10 Cyber Liability Insurance Chapter 11 Cybersustai nability: Ethical Data Handling for Corporate Responsibility Chapter 12 Magic 8 Ball Says "Yes"
Chapter 1 Into the Mind of a Malicious Actor Chapter 2 Reviewing the Compliance Landscape Chapter 3 Compliance Risk Chapter 4 Looking at Risk through a Security Lens Chapter 5 How to Set Controls Chapter 6 Continuous Monitoring Chapter 7 Vendor Risk Management: Securing the Supply Chain Chapter 8 Calculating the Total Cost of Compliance Chapter 9 Information Security Audit: The What, How, and Why Chapter 10 Cyber Liability Insurance Chapter 11 Cybersustai nability: Ethical Data Handling for Corporate Responsibility Chapter 12 Magic 8 Ball Says "Yes"
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Shop der buecher.de GmbH & Co. KG Bürgermeister-Wegele-Str. 12, 86167 Augsburg Amtsgericht Augsburg HRA 13309