N.K. McCarthy, Matthew Todd, Jeff Klaben
The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk
N.K. McCarthy, Matthew Todd, Jeff Klaben
The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Based on real-world incident response plans that work and have survived audits and repeated execution during data breaches and due diligence
Andere Kunden interessierten sich auch für
- Strategic Intelligence Management87,99 €
- Valerie LyonsThe Privacy Leader Compass39,99 €
- Barak EngelThe Security Hippie32,99 €
- Andres AndreuThe CISO Playbook61,99 €
- Shivi GargMobile OS Vulnerabilities100,99 €
- Helen Wong MBECyber Security212,99 €
- Courtney BowmanThe Architecture of Privacy: On Engineering Technologies That Can Deliver Trustworthy Safeguards33,99 €
-
-
-
Based on real-world incident response plans that work and have survived audits and repeated execution during data breaches and due diligence
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: McGraw-Hill Education - Europe
- Seitenzahl: 240
- Erscheinungstermin: 7. August 2012
- Englisch
- Abmessung: 228mm x 184mm x 22mm
- Gewicht: 402g
- ISBN-13: 9780071790390
- ISBN-10: 007179039X
- Artikelnr.: 35048701
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- 06621 890
- Verlag: McGraw-Hill Education - Europe
- Seitenzahl: 240
- Erscheinungstermin: 7. August 2012
- Englisch
- Abmessung: 228mm x 184mm x 22mm
- Gewicht: 402g
- ISBN-13: 9780071790390
- ISBN-10: 007179039X
- Artikelnr.: 35048701
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- 06621 890
N.K. McCarthy previously managed the Information Security Operations / Threat & Vulnerability Management for a Fortune 50 Corporation for several years. His international staff performed round-the-clock security event monitoring and response. His responsibilities included: security patch remediation, vulnerability scans, and remediation, penetration testing, system configuration monitoring and remediation, maintaining the various Computer Incident Response Plans (CIRP), and an active threat portfolio for key business functions, users, application platforms and persistent vulnerabilities. With a career in over 20 plus years in IT, Mr. McCarthy has held a wide range of roles within IT including systems programming, IT consultant, technical management, and IT sales. He recently retired after 30 plus years as a Marine Corps reservist obtaining the rank of Lieutenant Colonel. His last reserve assignment of five years was with the U.S. Cyber Command. After 9/11, Lt. Col. McCarthy was mobilized and spent almost four years on active duty as an Information Warfare Officer working at the U.S. Strategic Command, the Pentagon, and the National Security Agency (NSA). Mr. McCarthy also has 17 years of experience as a volunteer reserve police officer. In this capacity he was able to attend U.S. DOJ (Law Enforcement Only) training in computer forensics and advanced Internet investigations. He was also certified by FEMA for its Incident Command System (ICS) and the National Incident Management System (NIMS). Mr. McCarthy is currently on the Board of Directors of the San Francisco Bay Area and Silicon Valley chapter of the FBI's Infragard program. Mr. McCarthy has a B.S. degree in Computer Science, an M.B.A. and a CISSP. He is also the CEO of an SDVOB S-corporation with established and developing business in California and Nevada.
Introduction: The Latest Cyber Attacks: Business Killers
Part 1: The Threat Landscape
Ch 1Introduction to Planning & Crisis
Ch 2The Nebulous Standard of Cyber Due Diligence & The New Era of
Information Risk
Part 2: Planning for Crisis
Ch 3A Plan is Preparation Manifested
Ch 4 Writing Your Computer Incident Response Plan
Part 3: Plan Development - Data Breach
Ch 5Your Data Breach CIRP - Incident Preparation
Ch 6Developing a Data Breach CIRP - Plan Execution
Ch 7Your Data Breach CIRP - Post Incident Planning & Maintenance
Part 4: Plan Development - Malware
Ch 8Your Malware Outbreak CIRP - Incident Preparation
Ch 9Your Malware Outbreak CIRP - Plan Execution
Ch 10Your Malware Outbreak CIRP - Post Incident Planning
Ch 11Closing Thoughts
Part 1: The Threat Landscape
Ch 1Introduction to Planning & Crisis
Ch 2The Nebulous Standard of Cyber Due Diligence & The New Era of
Information Risk
Part 2: Planning for Crisis
Ch 3A Plan is Preparation Manifested
Ch 4 Writing Your Computer Incident Response Plan
Part 3: Plan Development - Data Breach
Ch 5Your Data Breach CIRP - Incident Preparation
Ch 6Developing a Data Breach CIRP - Plan Execution
Ch 7Your Data Breach CIRP - Post Incident Planning & Maintenance
Part 4: Plan Development - Malware
Ch 8Your Malware Outbreak CIRP - Incident Preparation
Ch 9Your Malware Outbreak CIRP - Plan Execution
Ch 10Your Malware Outbreak CIRP - Post Incident Planning
Ch 11Closing Thoughts
Introduction: The Latest Cyber Attacks: Business Killers
Part 1: The Threat Landscape
Ch 1Introduction to Planning & Crisis
Ch 2The Nebulous Standard of Cyber Due Diligence & The New Era of
Information Risk
Part 2: Planning for Crisis
Ch 3A Plan is Preparation Manifested
Ch 4 Writing Your Computer Incident Response Plan
Part 3: Plan Development - Data Breach
Ch 5Your Data Breach CIRP - Incident Preparation
Ch 6Developing a Data Breach CIRP - Plan Execution
Ch 7Your Data Breach CIRP - Post Incident Planning & Maintenance
Part 4: Plan Development - Malware
Ch 8Your Malware Outbreak CIRP - Incident Preparation
Ch 9Your Malware Outbreak CIRP - Plan Execution
Ch 10Your Malware Outbreak CIRP - Post Incident Planning
Ch 11Closing Thoughts
Part 1: The Threat Landscape
Ch 1Introduction to Planning & Crisis
Ch 2The Nebulous Standard of Cyber Due Diligence & The New Era of
Information Risk
Part 2: Planning for Crisis
Ch 3A Plan is Preparation Manifested
Ch 4 Writing Your Computer Incident Response Plan
Part 3: Plan Development - Data Breach
Ch 5Your Data Breach CIRP - Incident Preparation
Ch 6Developing a Data Breach CIRP - Plan Execution
Ch 7Your Data Breach CIRP - Post Incident Planning & Maintenance
Part 4: Plan Development - Malware
Ch 8Your Malware Outbreak CIRP - Incident Preparation
Ch 9Your Malware Outbreak CIRP - Plan Execution
Ch 10Your Malware Outbreak CIRP - Post Incident Planning
Ch 11Closing Thoughts