Shimon Brathwaite
What To Do When You Get Hacked
A Practitioner's Guide to Incident Response in the 21st Century
49,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in über 4 Wochen
Melden Sie sich
hier
hier
für den Produktalarm an, um über die Verfügbarkeit des Produkts informiert zu werden.
Shimon Brathwaite
What To Do When You Get Hacked
A Practitioner's Guide to Incident Response in the 21st Century
- Broschiertes Buch
This book teaches you everything that you need to know about preparing your company for a potential data breach. It is meant for the everyday business owner and makes these concepts simple to understand and apply.
Andere Kunden interessierten sich auch für
- Shimon BrathwaiteWhat To Do When You Get Hacked83,99 €
- Kenneth OkereaforCybersecurity in the COVID-19 Pandemic25,99 €
- Barak EngelThe Security Hippie32,99 €
- Pierre-Luc PomerleauEvidence-Based Cybersecurity57,99 €
- Julian AshbournPKI Implementation and Infrastructures137,99 €
- Abbas Moallem (Adjunct Faculty, San Jose State University, CA)Understanding Cybersecurity Technologies124,99 €
- David Skillicorn (Queen's University, Kingston, Ontario, Canada)Cyberspace, Data Analytics, and Policing98,99 €
-
-
-
This book teaches you everything that you need to know about preparing your company for a potential data breach. It is meant for the everyday business owner and makes these concepts simple to understand and apply.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 176
- Erscheinungstermin: 16. November 2022
- Englisch
- Abmessung: 274mm x 155mm x 22mm
- Gewicht: 300g
- ISBN-13: 9781032206080
- ISBN-10: 103220608X
- Artikelnr.: 64676127
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 176
- Erscheinungstermin: 16. November 2022
- Englisch
- Abmessung: 274mm x 155mm x 22mm
- Gewicht: 300g
- ISBN-13: 9781032206080
- ISBN-10: 103220608X
- Artikelnr.: 64676127
Shimon Brathwaite is author and editor-in-chief of securitymadesimple.org, a website dedicated to teaching business owners how to secure their businesses and helping cybersecurity professionals start and advance their careers. Before starting his career in Cybersecurity, Shimon was a co-op student at Ryerson University in Toronto, Canada, where he got a degree in Business Technology Management before deciding to specialize in Cybersecurity. Through his work at Ryerson University and his work after graduation, he has accumulated over 5 years of work experience in Cybersecurity across financial institutions, startups, and consulting companies. His work has primarily been in incident response and helping companies resolve security incidents, which is where he learned that most security incidents are caused by only a handful of problems. This is the premise for the book that you are about to read. If you want to continue to get cybersecurity tips and tricks for free and know when his next book comes out, please visit his website at https://www.securitymadesimple.org/, where you can find new content every week.
1. What Is the Cybersecurity Epidemic?
2. What Am I Defending My Company from?
3. How to Get Started with Your Cybersecurity Program.
4. Why Do You Need Cyber Insurance?
5. Compliance Regulations You Need to Be Aware of.
6. How to Be Prepared for Insider Threats.
7. How to Build an Effective Incident Response Team.
8. How to Pitch for a Quality Cybersecurity Budget.
9. Why You Need Continuous Security Validation.
10. The Importance of Routine Simulations.
11. The Six Steps to Preparing for a Cybersecurity Incident.
12. How to Analyze a Potential Cybersecurity Incident.
13. Steps to Containing a Cybersecurity Incident.
14. How to Eradicate and Recover from a Cybersecurity Incident.
15. What to Do If You Don't Have the Internal Expertise You Need.
16. How to Handle Third-Party Vendors That Have Suffered a Data Breach.
17. How to Remove Data Leaks Once They Are on the Internet.
18. How to Address the Public During a Data Breach.
19. How to Handle Disgruntled Customers During a Data Breach.
20. When Should I Get Law Enforcement Involved?
21. Public Authorities You Should Notify Throughout a Data Breach.
2. What Am I Defending My Company from?
3. How to Get Started with Your Cybersecurity Program.
4. Why Do You Need Cyber Insurance?
5. Compliance Regulations You Need to Be Aware of.
6. How to Be Prepared for Insider Threats.
7. How to Build an Effective Incident Response Team.
8. How to Pitch for a Quality Cybersecurity Budget.
9. Why You Need Continuous Security Validation.
10. The Importance of Routine Simulations.
11. The Six Steps to Preparing for a Cybersecurity Incident.
12. How to Analyze a Potential Cybersecurity Incident.
13. Steps to Containing a Cybersecurity Incident.
14. How to Eradicate and Recover from a Cybersecurity Incident.
15. What to Do If You Don't Have the Internal Expertise You Need.
16. How to Handle Third-Party Vendors That Have Suffered a Data Breach.
17. How to Remove Data Leaks Once They Are on the Internet.
18. How to Address the Public During a Data Breach.
19. How to Handle Disgruntled Customers During a Data Breach.
20. When Should I Get Law Enforcement Involved?
21. Public Authorities You Should Notify Throughout a Data Breach.
1. What Is the Cybersecurity Epidemic?
2. What Am I Defending My Company from?
3. How to Get Started with Your Cybersecurity Program.
4. Why Do You Need Cyber Insurance?
5. Compliance Regulations You Need to Be Aware of.
6. How to Be Prepared for Insider Threats.
7. How to Build an Effective Incident Response Team.
8. How to Pitch for a Quality Cybersecurity Budget.
9. Why You Need Continuous Security Validation.
10. The Importance of Routine Simulations.
11. The Six Steps to Preparing for a Cybersecurity Incident.
12. How to Analyze a Potential Cybersecurity Incident.
13. Steps to Containing a Cybersecurity Incident.
14. How to Eradicate and Recover from a Cybersecurity Incident.
15. What to Do If You Don't Have the Internal Expertise You Need.
16. How to Handle Third-Party Vendors That Have Suffered a Data Breach.
17. How to Remove Data Leaks Once They Are on the Internet.
18. How to Address the Public During a Data Breach.
19. How to Handle Disgruntled Customers During a Data Breach.
20. When Should I Get Law Enforcement Involved?
21. Public Authorities You Should Notify Throughout a Data Breach.
2. What Am I Defending My Company from?
3. How to Get Started with Your Cybersecurity Program.
4. Why Do You Need Cyber Insurance?
5. Compliance Regulations You Need to Be Aware of.
6. How to Be Prepared for Insider Threats.
7. How to Build an Effective Incident Response Team.
8. How to Pitch for a Quality Cybersecurity Budget.
9. Why You Need Continuous Security Validation.
10. The Importance of Routine Simulations.
11. The Six Steps to Preparing for a Cybersecurity Incident.
12. How to Analyze a Potential Cybersecurity Incident.
13. Steps to Containing a Cybersecurity Incident.
14. How to Eradicate and Recover from a Cybersecurity Incident.
15. What to Do If You Don't Have the Internal Expertise You Need.
16. How to Handle Third-Party Vendors That Have Suffered a Data Breach.
17. How to Remove Data Leaks Once They Are on the Internet.
18. How to Address the Public During a Data Breach.
19. How to Handle Disgruntled Customers During a Data Breach.
20. When Should I Get Law Enforcement Involved?
21. Public Authorities You Should Notify Throughout a Data Breach.