Information Security Breaches

Avoidance and Treatment based on ISO27001

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Information Security Breaches by Michael Krausz, IT Governance Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Michael Krausz ISBN: 9781849280280
Publisher: IT Governance Publishing Publication: December 15, 2009
Imprint: Language: English
Author: Michael Krausz
ISBN: 9781849280280
Publisher: IT Governance Publishing
Publication: December 15, 2009
Imprint:
Language: English
If something happens, your company needs to be ready to take prompt and decisive action to resolve the issue. This book tells you the plans and procedures you need to put in place to tackle an information security breach should it occur. In particular, the book gives you clear guidance on how to treat an information security breach in accordance with ISO27001. If a breach occurs, the evidence needs to be secured professionally. You need to know the rules on evidence gathering, and you need to be capable of isolating the suspect laptops right from the start. If you want your company to respond rapidly to an information security breach, you need to make sure that the responsibilities and roles in your company are clearly defined.
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
If something happens, your company needs to be ready to take prompt and decisive action to resolve the issue. This book tells you the plans and procedures you need to put in place to tackle an information security breach should it occur. In particular, the book gives you clear guidance on how to treat an information security breach in accordance with ISO27001. If a breach occurs, the evidence needs to be secured professionally. You need to know the rules on evidence gathering, and you need to be capable of isolating the suspect laptops right from the start. If you want your company to respond rapidly to an information security breach, you need to make sure that the responsibilities and roles in your company are clearly defined.

More books from IT Governance Publishing

Cover of the book Pragmatic Application of Service Management by Michael Krausz
Cover of the book Information Security A Practical Guide by Michael Krausz
Cover of the book RGPD UE by Michael Krausz
Cover of the book EU GDPR - A Pocket Guide (European) second edition by Michael Krausz
Cover of the book PRINCE2 Agile An Implementation Pocket Guide by Michael Krausz
Cover of the book EU GDPR: A Pocket Guide, School's edition by Michael Krausz
Cover of the book The Concise PRINCE2® by Michael Krausz
Cover of the book NIST Cybersecurity Framework - A pocket guide by Michael Krausz
Cover of the book Two-Factor Authenticaion by Michael Krausz
Cover of the book Agile Productivity Unleashed by Michael Krausz
Cover of the book Application Security in the ISO 27001:2013 Environment by Michael Krausz
Cover of the book ISO27001/ISO27002: Un guide de poche by Michael Krausz
Cover of the book Validating Your Business Continuity Plan by Michael Krausz
Cover of the book Selling Information Security to the Board by Michael Krausz
Cover of the book Security in the Digital World by Michael Krausz
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy