This book bridges the gap between complex technical language and business objectives to create a security-first review of the security and compliance landscapes. It has practical solutions for businesses to create "cybersustainable" security-focused policies, processes, and controls to protect today's future for tomorrow's digital ecosystem.
This book bridges the gap between complex technical language and business objectives to create a security-first review of the security and compliance landscapes. It has practical solutions for businesses to create "cybersustainable" security-focused policies, processes, and controls to protect today's future for tomorrow's digital ecosystem.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Karen Walsh passed the Connecticut Bar in 2004. She then worked as a Bank Secrecy Act internal auditor and contract compliance manager for fourteen years before discovering her passion for cybersecurity and privacy compliance. She spent eleven years teaching first-year college writing and applies many of the same pedagogical approaches to writing about information security. The ISACA Journal published her coauthored pieces on cybersustainability in 2019. Her book 100 Geek Heroines was published by ABC-CLIO, part of Bloomsbury, in October 2019, and she has also authored chapters in At Home in the Whedonverse (MacFarland, 2017) and Transmediating the Whedonverse (Springer, 2019).
Inhaltsangabe
Chapter 1 Into the Mind of a Malicious Actor Chapter 2 Reviewing the Compliance Landscape Chapter 3 Compliance Risk Chapter 4 Looking at Risk through a Security Lens Chapter 5 How to Set Controls Chapter 6 Continuous Monitoring Chapter 7 Vendor Risk Management: Securing the Supply Chain Chapter 8 Calculating the Total Cost of Compliance Chapter 9 Information Security Audit: The What, How, and Why Chapter 10 Cyber Liability Insurance Chapter 11 Cybersustai nability: Ethical Data Handling for Corporate Responsibility Chapter 12 Magic 8 Ball Says "Yes"
Chapter 1 Into the Mind of a Malicious Actor
Chapter 2 Reviewing the Compliance Landscape
Chapter 3 Compliance Risk
Chapter 4 Looking at Risk through a Security Lens
Chapter 5 How to Set Controls
Chapter 6 Continuous Monitoring
Chapter 7 Vendor Risk Management: Securing the Supply Chain
Chapter 8 Calculating the Total Cost of Compliance
Chapter 9 Information Security Audit: The What, How, and Why
Chapter 10 Cyber Liability Insurance
Chapter 11 Cybersustai nability: Ethical Data Handling for Corporate Responsibility
Chapter 1 Into the Mind of a Malicious Actor Chapter 2 Reviewing the Compliance Landscape Chapter 3 Compliance Risk Chapter 4 Looking at Risk through a Security Lens Chapter 5 How to Set Controls Chapter 6 Continuous Monitoring Chapter 7 Vendor Risk Management: Securing the Supply Chain Chapter 8 Calculating the Total Cost of Compliance Chapter 9 Information Security Audit: The What, How, and Why Chapter 10 Cyber Liability Insurance Chapter 11 Cybersustai nability: Ethical Data Handling for Corporate Responsibility Chapter 12 Magic 8 Ball Says "Yes"
Chapter 1 Into the Mind of a Malicious Actor
Chapter 2 Reviewing the Compliance Landscape
Chapter 3 Compliance Risk
Chapter 4 Looking at Risk through a Security Lens
Chapter 5 How to Set Controls
Chapter 6 Continuous Monitoring
Chapter 7 Vendor Risk Management: Securing the Supply Chain
Chapter 8 Calculating the Total Cost of Compliance
Chapter 9 Information Security Audit: The What, How, and Why
Chapter 10 Cyber Liability Insurance
Chapter 11 Cybersustai nability: Ethical Data Handling for Corporate Responsibility
Chapter 12 Magic 8 Ball Says "Yes"
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826