The Manager’s Guide to Cybersecurity Law

Essentials for Today's Business

Business & Finance, Industries & Professions, Insurance, Management & Leadership, Management
Cover of the book The Manager’s Guide to Cybersecurity Law by Tari Schreider, Rothstein Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Tari Schreider ISBN: 9781944480301
Publisher: Rothstein Publishing Publication: February 1, 2017
Imprint: Rothstein Publishing Language: English
Author: Tari Schreider
ISBN: 9781944480301
Publisher: Rothstein Publishing
Publication: February 1, 2017
Imprint: Rothstein Publishing
Language: English

In today’s litigious business world, cyber-related matters could land you in court. As a computer security professional, you are protecting your data, but are you protecting your company? While you know industry standards and regulations, you may not be a legal expert. Fortunately, in a few hours of reading, rather than months of classroom study, Tari Schreider’s The Manager’s Guide to Cybersecurity Law: Essentials for Today’s Business, lets you integrate legal issues into your security program.

Tari Schreider, a board-certified information security practitioner with a criminal justice administration background, has written a much-needed book that bridges the gap between cybersecurity programs and cybersecurity law. He says, “My nearly 40 years in the fields of cybersecurity, risk management, and disaster recovery have taught me some immutable truths. One of these truths is that failure to consider the law when developing a cybersecurity program results in a protective façade or false sense of security.”

In a friendly style, offering real-world business examples from his own experience supported by a wealth of court cases, Schreider covers the range of practical information you will need as you explore – and prepare to apply – cybersecurity law. His practical, easy-to-understand explanations help you to:

  • Understand your legal duty to act reasonably and responsibly to protect assets and information.
  • Identify which cybersecurity laws have the potential to impact your cybersecurity program.
  • Upgrade cybersecurity policies to comply with state, federal, and regulatory statutes.
  • Communicate effectively about cybersecurity law with corporate legal department and counsel.
  • Understand the implications of emerging legislation for your cybersecurity program.
  • Know how to avoid losing a cybersecurity court case on procedure – and develop strategies to handle a dispute out of court.
  • Develop an international view of cybersecurity and data privacy – and international legal frameworks.

Schreider takes you beyond security standards and regulatory controls to ensure that your current or future cybersecurity program complies with all laws and legal jurisdictions. Hundreds of citations and references allow you to dig deeper as you explore specific topics relevant to your organization or your studies. This book needs to be required reading before your next discussion with your corporate legal department.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

In today’s litigious business world, cyber-related matters could land you in court. As a computer security professional, you are protecting your data, but are you protecting your company? While you know industry standards and regulations, you may not be a legal expert. Fortunately, in a few hours of reading, rather than months of classroom study, Tari Schreider’s The Manager’s Guide to Cybersecurity Law: Essentials for Today’s Business, lets you integrate legal issues into your security program.

Tari Schreider, a board-certified information security practitioner with a criminal justice administration background, has written a much-needed book that bridges the gap between cybersecurity programs and cybersecurity law. He says, “My nearly 40 years in the fields of cybersecurity, risk management, and disaster recovery have taught me some immutable truths. One of these truths is that failure to consider the law when developing a cybersecurity program results in a protective façade or false sense of security.”

In a friendly style, offering real-world business examples from his own experience supported by a wealth of court cases, Schreider covers the range of practical information you will need as you explore – and prepare to apply – cybersecurity law. His practical, easy-to-understand explanations help you to:

Schreider takes you beyond security standards and regulatory controls to ensure that your current or future cybersecurity program complies with all laws and legal jurisdictions. Hundreds of citations and references allow you to dig deeper as you explore specific topics relevant to your organization or your studies. This book needs to be required reading before your next discussion with your corporate legal department.

More books from Rothstein Publishing

Cover of the book The Manager’s Guide to Business Continuity Exercises by Tari Schreider
Cover of the book Introduction to Emergency Evacuation by Tari Schreider
Cover of the book Building Effective Cybersecurity Programs by Tari Schreider
Cover of the book The Manager’s Guide to Quick Crisis Response by Tari Schreider
Cover of the book Adaptive Business Continuity: A New Approach by Tari Schreider
Cover of the book Enterprise Security Risk Management by Tari Schreider
Cover of the book Business Continuity Planning by Tari Schreider
Cover of the book Creating and Maintaining Resilient Supply Chains by Tari Schreider
Cover of the book The Manager's Guide to Bullies in the Workplace by Tari Schreider
Cover of the book Motor Disorders by Tari Schreider
Cover of the book Business Continuity and Risk Management by Tari Schreider
Cover of the book Lukaszewski on Crisis Communication by Tari Schreider
Cover of the book Simplifying Cause Analysis by Tari Schreider
Cover of the book Emergency Evacuation Planning for Your Workplace by Tari Schreider
Cover of the book Business Continuity Management by Tari Schreider
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy