What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century teaches you everything that you need to know about preparing your company for a potential data breach. We begin by talking about what the latest cybersecurity threats and attacks are that your company needs to be prepared for. Once we establish that, we go into the different phases of the incident response lifecycle based on the NIST framework. This will teach you how to properly prepare and respond to cybersecurity incidents so that you can be sure to minimize damage and fulfill all of your legal…mehr
What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century teaches you everything that you need to know about preparing your company for a potential data breach. We begin by talking about what the latest cybersecurity threats and attacks are that your company needs to be prepared for. Once we establish that, we go into the different phases of the incident response lifecycle based on the NIST framework. This will teach you how to properly prepare and respond to cybersecurity incidents so that you can be sure to minimize damage and fulfill all of your legal requirements during a cyberattack. This book is meant for the everyday business owner and makes these concepts simple to understand and apply.
Shimon Brathwaite is author and editor-in-chief of securitymadesimple.org, a website dedicated to teaching business owners how to secure their businesses and helping cybersecurity professionals start and advance their careers. Before starting his career in Cybersecurity, Shimon was a co-op student at Ryerson University in Toronto, Canada, where he got a degree in Business Technology Management before deciding to specialize in Cybersecurity. Through his work at Ryerson University and his work after graduation, he has accumulated over 5 years of work experience in Cybersecurity across financial institutions, startups, and consulting companies. His work has primarily been in incident response and helping companies resolve security incidents, which is where he learned that most security incidents are caused by only a handful of problems. This is the premise for the book that you are about to read. If you want to continue to get cybersecurity tips and tricks for free and know when his next book comes out, please visit his website at https://www.securitymadesimple.org/, where you can find new content every week.
Inhaltsangabe
1. What Is the Cybersecurity Epidemic?
2. What Am I Defending My Company from?
3. How to Get Started with Your Cybersecurity Program.
4. Why Do You Need Cyber Insurance?
5. Compliance Regulations You Need to Be Aware of.
6. How to Be Prepared for Insider Threats.
7. How to Build an Effective Incident Response Team.
8. How to Pitch for a Quality Cybersecurity Budget.
9. Why You Need Continuous Security Validation.
10. The Importance of Routine Simulations.
11. The Six Steps to Preparing for a Cybersecurity Incident.
12. How to Analyze a Potential Cybersecurity Incident.
13. Steps to Containing a Cybersecurity Incident.
14. How to Eradicate and Recover from a Cybersecurity Incident.
15. What to Do If You Don't Have the Internal Expertise You Need.
16. How to Handle Third-Party Vendors That Have Suffered a Data Breach.
17. How to Remove Data Leaks Once They Are on the Internet.
18. How to Address the Public During a Data Breach.
19. How to Handle Disgruntled Customers During a Data Breach.
20. When Should I Get Law Enforcement Involved?
21. Public Authorities You Should Notify Throughout a Data Breach.
1. What Is the Cybersecurity Epidemic? 2. What Am I Defending My Company from? 3. How to Get Started with Your Cybersecurity Program. 4. Why Do You Need Cyber Insurance? 5. Compliance Regulations You Need to Be Aware of. 6. How to Be Prepared for Insider Threats. 7. How to Build an Effective Incident Response Team. 8. How to Pitch for a Quality Cybersecurity Budget. 9. Why You Need Continuous Security Validation. 10. The Importance of Routine Simulations. 11. The Six Steps to Preparing for a Cybersecurity Incident. 12. How to Analyze a Potential Cybersecurity Incident. 13. Steps to Containing a Cybersecurity Incident. 14. How to Eradicate and Recover from a Cybersecurity Incident. 15. What to Do If You Don't Have the Internal Expertise You Need. 16. How to Handle Third-Party Vendors That Have Suffered a Data Breach. 17. How to Remove Data Leaks Once They Are on the Internet. 18. How to Address the Public During a Data Breach. 19. How to Handle Disgruntled Customers During a Data Breach. 20. When Should I Get Law Enforcement Involved? 21. Public Authorities You Should Notify Throughout a Data Breach.
3. How to Get Started with Your Cybersecurity Program.
4. Why Do You Need Cyber Insurance?
5. Compliance Regulations You Need to Be Aware of.
6. How to Be Prepared for Insider Threats.
7. How to Build an Effective Incident Response Team.
8. How to Pitch for a Quality Cybersecurity Budget.
9. Why You Need Continuous Security Validation.
10. The Importance of Routine Simulations.
11. The Six Steps to Preparing for a Cybersecurity Incident.
12. How to Analyze a Potential Cybersecurity Incident.
13. Steps to Containing a Cybersecurity Incident.
14. How to Eradicate and Recover from a Cybersecurity Incident.
15. What to Do If You Don't Have the Internal Expertise You Need.
16. How to Handle Third-Party Vendors That Have Suffered a Data Breach.
17. How to Remove Data Leaks Once They Are on the Internet.
18. How to Address the Public During a Data Breach.
19. How to Handle Disgruntled Customers During a Data Breach.
20. When Should I Get Law Enforcement Involved?
21. Public Authorities You Should Notify Throughout a Data Breach.
1. What Is the Cybersecurity Epidemic? 2. What Am I Defending My Company from? 3. How to Get Started with Your Cybersecurity Program. 4. Why Do You Need Cyber Insurance? 5. Compliance Regulations You Need to Be Aware of. 6. How to Be Prepared for Insider Threats. 7. How to Build an Effective Incident Response Team. 8. How to Pitch for a Quality Cybersecurity Budget. 9. Why You Need Continuous Security Validation. 10. The Importance of Routine Simulations. 11. The Six Steps to Preparing for a Cybersecurity Incident. 12. How to Analyze a Potential Cybersecurity Incident. 13. Steps to Containing a Cybersecurity Incident. 14. How to Eradicate and Recover from a Cybersecurity Incident. 15. What to Do If You Don't Have the Internal Expertise You Need. 16. How to Handle Third-Party Vendors That Have Suffered a Data Breach. 17. How to Remove Data Leaks Once They Are on the Internet. 18. How to Address the Public During a Data Breach. 19. How to Handle Disgruntled Customers During a Data Breach. 20. When Should I Get Law Enforcement Involved? 21. Public Authorities You Should Notify Throughout a Data Breach.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/neu