Information Security Breaches

Avoidance and Treatment based on ISO27001

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Information Security Breaches by Michael Krausz, IT Governance Ltd
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Michael Krausz ISBN: 9781849285858
Publisher: IT Governance Ltd Publication: May 27, 2014
Imprint: IT Governance Publishing Language: English
Author: Michael Krausz
ISBN: 9781849285858
Publisher: IT Governance Ltd
Publication: May 27, 2014
Imprint: IT Governance Publishing
Language: English

How would your business respond to an information security breach?

If you are running a business, you learn to expect the unexpected. Even if you have taken all the right precautions, your company might still find itself confronted with an information security breach. How would your business cope then?

There are lots of books that will tell you what to do to prevent an information security breach. This book is different. It tells you what you have to do if a security breach occurs.

Security breaches sometimes occur because computers containing sensitive information are not returned to their owners. NATO laptops have been spotted in flea markets, and US government computers were put up for sale on Ebay. Security breaches may also be the result of data theft. A bad apple in your company may be tempted to sell your confidential data to a rival firm.

If something happens, your company needs to be ready to take prompt and decisive action to resolve the issue. This book tells you the plans and procedures you need to put in place to tackle an information security breach should it occur. In particular, the book gives you clear guidance on how to treat an information security breach in accordance with ISO27001.

If a breach occurs, the evidence needs to be secured professionally. You need to know the rules on evidence gathering, and you need to be capable of isolating the suspect laptops right from the start. If you want your company to respond rapidly to an information security breach, you need to make sure that the responsibilities and roles in your company are clearly defined.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

How would your business respond to an information security breach?

If you are running a business, you learn to expect the unexpected. Even if you have taken all the right precautions, your company might still find itself confronted with an information security breach. How would your business cope then?

There are lots of books that will tell you what to do to prevent an information security breach. This book is different. It tells you what you have to do if a security breach occurs.

Security breaches sometimes occur because computers containing sensitive information are not returned to their owners. NATO laptops have been spotted in flea markets, and US government computers were put up for sale on Ebay. Security breaches may also be the result of data theft. A bad apple in your company may be tempted to sell your confidential data to a rival firm.

If something happens, your company needs to be ready to take prompt and decisive action to resolve the issue. This book tells you the plans and procedures you need to put in place to tackle an information security breach should it occur. In particular, the book gives you clear guidance on how to treat an information security breach in accordance with ISO27001.

If a breach occurs, the evidence needs to be secured professionally. You need to know the rules on evidence gathering, and you need to be capable of isolating the suspect laptops right from the start. If you want your company to respond rapidly to an information security breach, you need to make sure that the responsibilities and roles in your company are clearly defined.

More books from IT Governance Ltd

Cover of the book Turning Heads and Changing Minds by Michael Krausz
Cover of the book Everything you want to know about Business Continuity by Michael Krausz
Cover of the book Implementing Service Quality based on ISO/IEC 20000 by Michael Krausz
Cover of the book Nine Steps to Success- An ISO 27001 Implementation Overview, North American edition by Michael Krausz
Cover of the book The Definitive Guide to the C&A Transformation Process by Michael Krausz
Cover of the book Managing Information Security Breaches by Michael Krausz
Cover of the book Risk Assessment for Asset Owners by Michael Krausz
Cover of the book 21st Century Chinese Cyberwarfare by Michael Krausz
Cover of the book Business Continuity Management by Michael Krausz
Cover of the book Integrated Measurement - KPIs and Metrics for ITSM by Michael Krausz
Cover of the book ISO27001:2013 Assessments Without Tears by Michael Krausz
Cover of the book IT Outsourcing Contracts by Michael Krausz
Cover of the book The Chief Information Security Officer by Michael Krausz
Cover of the book Security Testing Handbook for Banking Applications by Michael Krausz
Cover of the book OHSAS 18001 Step by Step by Michael Krausz
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy