Skip to Main Content
USA
Select regional store:
Get ahead in Cloud security – save 25% on selected training courses. Find out more.
Managing Information Security Breaches: Studies from real life

Managing Information Security Breaches - Studies from real life, 2nd Edition


SKU: 3216
Authors: Michael Krausz
Publishers: IT Governance Publishing
Format: PDF
ISBN13: 9781849285964
Pages: 199
Published: 29 Jan 2015
Availability: Always Available
Format: ePub
ISBN13: 9781849285971
Pages: 184
Published: 29 Jan 2015
Availability: Always Available

Prepare for a breach with this thought-provoking guide, which details how breaches can be treated and the direction you should take if you’ve been affected.

Spiced with real-life incidents and breaches, this guide will inform a first-line defense for those looking to avoid and/or minimize the destruction caused by a data breach. 

Buy now, pay later! Enjoy the benefits of paying by purchase order with an IT Governance corporate account. Apply online today or call our service center team on +1 877 317 3454.

Options:
Price: $31.99
Overview

A comprehensive guide to managing an information security incident

Aligned with the international information security standard, ISO 27001:2013, this book sets out a strategic framework for handling information security incidents and breaches, including:

  • In-depth guidance for dealing with information security breaches
  • How they can be treated and what ISO 27001 can offer
  • Real-life incidents and breaches that can help you prepare for situations you may face in the future
  • Valuable lessons that your organization can learn

Your top priorities after a breach

What should you do first? Who should you go to? How should you handle it?

The author explains what your top priorities should be the moment you realize a breach has occurred, making this book essential reading for IT security managers, chief security officers, chief information officers,  and chief executive officers.

It will also be of use to personnel in non-IT roles, in an effort to make this subject more comprehensible to those who, in a worst-case scenario, will be on the receiving end of requests for six- or seven-figure excess budgets to cope with severe incidents.


By reading this guide, you’ll learn:

  • How to get your risk profile right
  • The different types of breaches
  • Avoidance and mitigation strategies
  • How small, medium-sized,  and large companies dealt with data breaches
  • The process of treating a data breach   
About the author

Michael Krausz

Michael Krausz studied physics, computer science and law at the Vienna University of Technology, Vienna University and Webster University. Over the last 20 years he has become an accomplished professional investigator, IT expert and ISO 27001 auditor, investigating over a hundred information security breaches. He has delivered over 5,000 hours of professional and academic training, and has provided consulting or investigation services in 21 countries.

Customer reviews

top
This website uses cookies. View our cookie policy
Save on
Training
Loading...