0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
Status
Brand

Showing 1 - 25 of 110 matches in All Departments

EU General Data Protection Regulation (GDPR) - An Implementation and Compliance Guide (Paperback, 3rd ed.): It Governance... EU General Data Protection Regulation (GDPR) - An Implementation and Compliance Guide (Paperback, 3rd ed.)
It Governance Privacy Team
R802 Discovery Miles 8 020 Ships in 12 - 17 working days
PCI Dss: A Pocket Guide (Paperback, 6th ed.): IT Governance PCI Dss: A Pocket Guide (Paperback, 6th ed.)
IT Governance
R415 Discovery Miles 4 150 Ships in 12 - 17 working days

This pocket guide is perfect as a quick reference for PCI professionals, or as a handy introduction for new staff. It explains the fundamental concepts of the latest iteration of the PCI DSS, v3.2.1, making it an ideal training resource. It will teach you how to protect your customers' cardholder data with best practice from the Standard.

Sponsoring Change - A Guide to the Governance Aspects of Project Sponsorship (Paperback): APM Governance Specific Interest Group Sponsoring Change - A Guide to the Governance Aspects of Project Sponsorship (Paperback)
APM Governance Specific Interest Group
R404 Discovery Miles 4 040 Ships in 12 - 17 working days
Directing Change (Paperback): APM Governance Specific Interest Group Directing Change (Paperback)
APM Governance Specific Interest Group
R404 Discovery Miles 4 040 Ships in 12 - 17 working days
Directing Agile Change (Paperback): Governance Specific Interest Group Directing Agile Change (Paperback)
Governance Specific Interest Group
R566 Discovery Miles 5 660 Ships in 12 - 17 working days
Business Continuity and the Pandemic Threat - Potentially the Biggest Survival Challenge Facing Organisations (Paperback): It... Business Continuity and the Pandemic Threat - Potentially the Biggest Survival Challenge Facing Organisations (Paperback)
It Governance Publishing
R1,134 Discovery Miles 11 340 Ships in 12 - 17 working days

Considering the pandemic threat in a business continuity context I thoroughly enjoyed reading Clark's book which is written in a style that makes it easy for anyone to understand without requiring a background in medicine or business. I have been involved in disaster management planning for the past ten years and yet I still found this book both enlightening and extremely informative. Dr Tanya Melillo MD, MSc(Dist), PhD This informative book is written in an easy going and conversational manner, but the message it brings to the table is critical to understanding the meaning of any forthcoming pandemic threat and considerations of how to mitigate the effects, where possible, to you and your organisation Owen Gregory MSc BA (Hons) MBCI MBCS The increase in commercial aviation and international travel means that pandemics now spread faster than ever before. Seasonal flu pandemics, zoonotic contagions such as Ebola, swine flu and avian flu (e.g. H5N1 and H7N9), and respiratory syndromes such as SARS and MERS have affected millions worldwide. Add the ever-present threat of terrorism and biological warfare, and the possibility of large proportions of your workforce being incapacitated is a lot stronger than you might think. You may well have prepared for limited business interruptions, but how would your business fare if 50% or more of your employees, including those you rely on to execute your business continuity plan, were afflicted by illness - or worse? Although nothing can be done to prevent pandemics, their impact can be significantly mitigated. Business Continuity and the Pandemic Threat explains how. Product overview The book is divided into two parts, which examine the pandemic threat and explain how businesses can address it: Part I: Understanding the Threat The first, shorter, part provides the reader with a detailed overview of the challenge that pandemic threats can present. It uses historical examples (such as the 1918-19 Spanish Flu outbreak, which killed 50 million) to illustrate how pandemics can have devastating effects not only on the global population but also on critical infrastructure, the global economy and society. Part II: Preparing for the Inevitable The second part of the book considers the actions that can be taken at a global, national, corporate and individual level to mitigate the risk and limit the damage of pandemic incidents. It provides guidance on creating and validating a pandemic plan, and explains how it integrates with a business continuity plan. Comprehensive case studies are provided throughout. Topics covered include: The World Health Organisation (WHO)'s pandemic phases and the Centre for Disease Control (CDC)'s Pandemic Severity Index Preventive control measures Crisis management and the composition of a crisis management team Dealing with cash-flow, staff absenteeism, home working and supply chain management Communications and media plans Pandemic issues for HR The threat to critical national infrastructure Health service contingency plans and first responders' business continuity plans The provision of vaccines and antiviral medicines, including relevant ethical issues Take your business continuity plan to the next level: ensure your organisation survives a pandemic with a substantially depleted workforce. Buy Business Continuity and the Pandemic Threat today. About the author A Fellow of the Institute of Business Continuity Management and Member of the Business Continuity Institute, Robert A. Clark is also a Fellow of the British Computer Society and a Member of the Security Institute. His career includes 15 years with IBM and 11 years with Fujitsu Services working with clients on BCM related assignments. He is now a freelance business continuity consultant at www.bcm-consultancy.com.

Agile - An Executive Guide (Paperback, 2nd Revised edition): It Governance Publishing Agile - An Executive Guide (Paperback, 2nd Revised edition)
It Governance Publishing
R418 Discovery Miles 4 180 Ships in 12 - 17 working days

The true power of Agile methodologies is not technology; it is business value generation. Use Agile methodologies to turn your IT solution challenges into high business-value returns All too often, IT solutions are plagued by budget overruns, missed deadlines, low-quality outputs and dissatisfied users. Agile methodologies are proven, common-sense methods for substantially increasing the relevance, flexibility and bottom-line business value of your software solutions. Quantify and measure the benefits that Agile methodologies can deliver to your organisation. Agile methodologies, such as Scrum, DSDM, FDD, Lean, XP and Kanban, are proven approaches for applying the finite resources of an organisation to deliver high business-value software solutions on time and within allocated budgets. These methodologies protect organisations from wasting their IT budgets by replacing large upfront financial commitments with incremental investment based on the ongoing business value of delivered software. They encourage collaboration with key stakeholders, empower staff to regularly deliver bottom-line value, and ensure that IT solutions are responsive to ongoing organisational and market changes. Read this guide and ... Understand the 10 core business benefits of Agile. At the heart of Agile methodologies are 10 core business benefits that enable organisations to maximise their IT investments, including: Better risk management, ongoing control of budget expenditure, better alignment with business requirements, and substantially higher quality IT solutions. Agile: An Executive Guide details each of these benefits from a strategic senior management perspective. Identify which Agile methodologies align with the specific needs of your organisation. Agile: An Executive Guide provides you with tools to assess your organisational culture, structure and dynamic in order to determine whether Agile methodologies are suitable to your specific needs, and to select those Agile methodologies that are the best fit for your organisation. Get the essential information you need to implement Agile within your organisation. Agile: An Executive Guide is full of practical advice, including detailed guidelines to help you: Choose the right kick-off point for Agile within your organisation; avoid common traps; monitor and measure your investment; and broaden the use of Agile methodologies into other areas of your organisation. It includes step-by-step guidelines, interactive tools and targeted questionnaires to help you and your staff successfully implement these methodologies. Agile: An Executive Guide describes Agile methodologies in clear business language specifically written for business professionals. It will help you make realistic business-driven decisions on whether Agile methodologies are appropriate for your organisation; whether you are looking to consolidate your IT overheads, to provide better software solutions to your clients, or to have more control over your IT expenditures. This guide provides practical, proven ways to introduce, incorporate and leverage Agile methodologies to maximise your business returns.

PCI DSS - A Pocket Guide (Paperback, 4th Revised edition): It Governance Publishing PCI DSS - A Pocket Guide (Paperback, 4th Revised edition)
It Governance Publishing
R415 Discovery Miles 4 150 Ships in 12 - 17 working days

An ideal introduction and a quick reference to PCI DSS version 3.1 All businesses that accept payment cards are prey for hackers and criminal gangs trying to steal financial information and commit identity fraud. The PCI DSS (Payment Card Industry Data Security Standard) exists to ensure that businesses process credit and debit card orders in a way that protects cardholder data effectively. All organisations that accept, store, transmit or process cardholder data must comply with the Standard; failure to do so can have serious consequences for their ability to process card payments. Product overview Co-written by a PCI QSA (Qualified Security Assessor) and updated to cover PCI DSS version 3.1, this handy pocket guide provides all the information you need to consider as you approach the PCI DSS. It is also an ideal training resource for anyone in your organisation who deals with payment card processing. Coverage includes: An overview of Payment Card Industry Data Security Standard v3.1. A PCI self-assessment questionnaire (SAQ). Procedures and qualifications. An overview of the Payment Application Data Security Standard. Contents 1.What is the Payment Card Industry Data Security Standard (PCI DSS)? 2.What is the Scope of the PCI DSS? 3.Compliance and Compliance Programmes 4.Consequences of a Breach 5.How do you Comply with the Requirements of the Standard? 6.Maintaining Compliance 7.PCI DSS - The Standard 8.Aspects of PCI DSS Compliance 9.The PCI Self-Assessment Questionnaire 10.Procedures and Qualifications 11.The PCI DSS and ISO/IEC 27001 12.The Payment Application Data Security Standard (PA-DSS) 13.PIN Transaction Security (PTS) About the authors Alan Calder is the founder and executive chairman of IT Governance Ltd, an information, advice and consultancy firm that helps company boards tackle IT governance, risk management, compliance and information security issues. He has many years of senior management experience in the private and public sectors. Geraint Williams is a knowledgeable and experienced senior information security consultant and PCI QSA, with a strong technical background and experience of the PCI DSS and security testing. Geraint has provided consultancy on implementation of the PCI DSS, and conducted audits with a wide range of merchants and service providers. He has performed penetration testing and vulnerability assessments for various clients. Geraint leads the IT Governance CISSP Accelerated Training Programme, as well as the PCI Foundation and Implementer training courses. He has broad technical knowledge of security and IT infrastructure, including high performance computing, and Cloud computing. His certifications include CISSP, PCI QSA, CREST Registered Tester, CEH and CHFI."

An Introduction to Anti-Bribery Management Systems - Doing Right Things (Paperback): Alan Field An Introduction to Anti-Bribery Management Systems - Doing Right Things (Paperback)
Alan Field; Edited by It Governance Publishing
R365 Discovery Miles 3 650 Ships in 12 - 17 working days

When is a gift not a gift? When it's a bribe. For many, corporate hospitality oils the wheels of commerce. But where do you draw the line? Bribes, incentives and inducements are not just a matter of used banknotes stuffed in brown envelopes. Expenses, corporate settlement of personal bills, gifts and hospitality can all be used to influence business partners, clients and contractors. Can you afford unlimited fines? Under the Bribery Act 2010, a maximum of ten years' imprisonment and an unlimited fine may be imposed for offering, promising, giving, requesting, agreeing, receiving or accepting bribes. With such strict penalties, it's astonishing that so few companies have few or no measures in place to ensure that they are not liable for prosecution. This is especially astonishing as the Ministry of Justice's Quick start guide to the Bribery Act makes it clear that "There is a full defence if you can show you had adequate procedures in place to prevent bribery." Such procedures can be found in BS 10500:2010, the British Standard for anti-bribery management systems (ABMSs). How to implement an ABMS An Introduction to Anti-Bribery Management Systems (BS 10500) explains how to implement an ABMS that meets the requirements of BS 10500, from initial gap analysis to due diligence management: * An introduction to BS 10500 * An explanation of an ABMS * Management processes within an ABMS * Implementing an ABMS * Risk assessment in due diligence * Whistleblowing and bribery investigations * Internal auditing and corrective action * Certification to BS 10500 It provides helpful guidance on the importance of clearly defining policies; logging gifts and hospitality in auditable records; ensuring a consistent approach across the organisation; controls for contractors; facilitation payments; charitable and political donations; risk assessment in due diligence; whistle-blowing and bribery investigations; and internal auditing and corrective action. Meet the stringent requirements of the Bribery Act Not only will a BS 10500-compliant ABMS help your organisation prove its probity by meeting the stringent requirements of the Bribery Act, it can also be adapted to most legal or compliance systems. An ethical approach to business is not just a legal obligation but a way to protect your reputation. About the author Alan Field, MA, LL.B (Hons), PgC, MCQI CQP, MIIRSM, AIEMA, GIFireE, GradIOSH is a Chartered Quality Professional, an IRCA Registered Lead Auditor and member of the Society of Authors. Alan has particular expertise in auditing and assessing anti-bribery management systems to BS 10500 and public-sector counter-fraud systems to ISO9001. Alan has many years' experience with quality and integrated management systems in the legal, financial, property services and project management sectors in auditing, assessment and gap analysis roles. Your company's integrity is important. An Introduction to Anti-Bribery Management Systems (BS 10500) shows you how to maintain and prove it.

Two-Factor Authentication (Paperback): Mark Stanislav Two-Factor Authentication (Paperback)
Mark Stanislav; Edited by It Governance Publishing
R532 Discovery Miles 5 320 Ships in 12 - 17 working days

Passwords are not enough A password is a single authentication factor - anyone who has it can use it. No matter how strong it is, if it's lost or stolen, it's entirely useless at keeping information private. To secure your data properly, you also need to use a separate, secondary authentication factor. Data breaches are now commonplace In recent years, large-scale data breaches have increased dramatically in both severity and number, and the loss of personal information - including password data - has become commonplace. Furthermore, the fact that rapidly evolving password-cracking technology and the habitual use - and reuse - of weak passwords has rendered the security of username and password combinations negligible, and you have a very strong argument for more robust identity authentication. Consumers are beginning to realise just how exposed their personal and financial information is, and are demanding better security from the organisations that collect, process and store it. This has led to a rise in the adoption of two-factor authentication (TFA or 2FA). In the field of authentication security, the method of proving identity can be broken down into three characteristics - roughly summarised as 'what you have', 'what you are' and 'what you know'. Two-factor authentication relies on the combination of two of these factors. Product overview TFA is nothing new. It's mandated by requirement 8.3 of the Payment Card Industry Data Security Standard (PCI DSS) and banks have been using it for years, combining payment cards ('what you have') and PINs ('what you know'). If you use online banking you'll probably also have a chip authentication programme (CAP) keypad, which generates a one-time password (OTP). What is new is TFA's rising adoption beyond the financial sector. Two-Factor Authentication provides a comprehensive evaluation of popular secondary authentication methods, such as: Hardware-based OTP generation SMS-based OTP delivery Phone call-based mechanisms Geolocation-aware authentication Push notification-based authentication Biometric authentication factors Smart card verification As well as examining MFA (multi-factor authentication), 2SV (two-step verification) and strong authentication (authentication that goes beyond passwords, using security questions or layered security), the book also discusses the wider application of TFA for the average consumer, for example at such organisations as Google, Amazon and Facebook. It also considers the future of multi-factor authentication, including its application to the Internet of Things (IoT). Increasing your password strength will do absolutely nothing to protect you from online hacking, phishing attacks or corporate data breaches. If you're concerned about the security of your personal and financial data, you need to read this book. About the author Mark Stanislav is an information technology professional with over a decade's varied experience in systems administration, web application development and information security. He is currently a senior security consultant for the Strategic Services team at Rapid7. Mark has spoken internationally at nearly 100 events, including RSA, DEF CON, SecTor, SOURCE Boston, ShmooCon and THOTCON. News outlets such as the Wall Street Journal, Al Jazeera America, Fox Business, MarketWatch, CNN Money, Yahoo Finance, Marketplace and The Register have featured Mark's research, initiatives and insights on information security.

Digital Contact Tracing for Pandemic Response - Ethics and Governance Guidance (Paperback): Jeffrey P. Kahn, Johns Hopkins... Digital Contact Tracing for Pandemic Response - Ethics and Governance Guidance (Paperback)
Jeffrey P. Kahn, Johns Hopkins Project on Ethics and Governance of Digital Contact Tracing Technologies
R411 Discovery Miles 4 110 Ships in 12 - 17 working days

As nations race to hone contact-tracing efforts, the world's experts consider strategies for maximum transparency and impact. As public health professionals around the world work tirelessly to respond to the COVID-19 pandemic, it is clear that traditional methods of contact tracing need to be augmented in order to help address a public health crisis of unprecedented scope. Innovators worldwide are racing to develop and implement novel public-facing technology solutions, including digital contact tracing technology. These technological products may aid public health surveillance and containment strategies for this pandemic and become part of the larger toolbox for future infectious outbreak prevention and control. As technology evolves in an effort to meet our current moment, Johns Hopkins Project on Ethics and Governance of Digital Contact Tracing Technologies-a rapid research and expert consensus group effort led by Dr. Jeffrey P. Kahn of the Johns Hopkins Berman Institute of Bioethics in collaboration with the university's Center for Health Security-carried out an in-depth analysis of the technology and the issues it raises. Drawing on this analysis, they produced a report that includes detailed recommendations for technology companies, policymakers, institutions, employers, and the public. The project brings together perspectives from bioethics, health security, public health, technology development, engineering, public policy, and law to wrestle with the complex interactions of the many facets of the technology and its applications. This team of experts from Johns Hopkins University and other world-renowned institutions has crafted clear and detailed guidelines to help manage the creation, implementation, and application of digital contact tracing. Digital Contact Tracing for Pandemic Response is the essential resource for this fast-moving crisis. Contributors: Joseph Ali, JD; Anne Barnhill, PhD; Anita Cicero, JD; Katelyn Esmonde, PhD; Amelia Hood, MA; Brian Hutler, Phd, JD; Jeffrey P. Kahn, PhD, MPH; Alan Regenberg, MBE; Crystal Watson, DrPH, MPH; Matthew Watson; Robert Califf, MD, MACC; Ruth Faden, PhD, MPH; Divya Hosangadi, MSPH; Nancy Kass, ScD; Alain Labrique, PhD, MHS, MS; Deven McGraw, JD, MPH, LLM; Michelle Mello, JD, PhD; Michael Parker, BEd (Hons), MA, PhD; Stephen Ruckman, JD, MSc, MAR; Lainie Rutkow, JD, MPH, PhD; Josh Sharfstein, MD; Jeremy Sugarman, MD, MPH, MA; Eric Toner, MD; Mar Trotochaud, MSPH; Effy Vayena, PhD; Tal Zarsky, JSD, LLM, LLB

Artificial Intelligence - Ethical, Social and Security Impacts for the Present and the Future (Paperback): It Governance... Artificial Intelligence - Ethical, Social and Security Impacts for the Present and the Future (Paperback)
It Governance Publishing
R1,361 Discovery Miles 13 610 Ships in 10 - 15 working days

A global perspective on AI This book will provide a global perspective on AI and the challenges it represents, and will focus on the digital ethics surrounding AI technology.

The Art of Cyber Security - A Practical Guide to Winning the War on Cyber Crime (Paperback): It Governance Publishing The Art of Cyber Security - A Practical Guide to Winning the War on Cyber Crime (Paperback)
It Governance Publishing
R1,184 Discovery Miles 11 840 Ships in 10 - 15 working days

This book is about cyber security. In Part 1, the author discusses his thoughts on the cyber security industry and how those that operate within it should approach their role with the mindset of an artist. Part 2 explores the work of Sun Tzu's The Art of War.

Digital Earth - Cyber Threats, Privacy and Ethics in an Age of Paranoia (Paperback): It Governance Publishing Digital Earth - Cyber Threats, Privacy and Ethics in an Age of Paranoia (Paperback)
It Governance Publishing
R693 Discovery Miles 6 930 Ships in 10 - 15 working days

An accessible introduction to the most prevalent cyber threats in our current climate, this book discusses cyber terrorism, phishing, and ransomware attacks, and provides advice on how to mitigate such threats in our personal and professional lives.

The Eu Data Protection Code of Conduct for Cloud Service Providers - A Guide to Compliance (Paperback, One ed.): IT Governance The Eu Data Protection Code of Conduct for Cloud Service Providers - A Guide to Compliance (Paperback, One ed.)
IT Governance
R491 Discovery Miles 4 910 Ships in 10 - 15 working days

The EU Data Protection Code of Conduct for Cloud Service Providers - A guide to complianceFormally founded in 2017, the EU Data Protection Code of Conduct for Cloud Service Providers (otherwise known as the EU Cloud Code of Conduct; the Code) is a voluntary code of conduct created specifically to support GDPR compliance within the B2B (business-to-business) Cloud industry. The EU Commission, the Article 29 Working Party (now the European Data Protection Board (EDPB)), the EU Directorate-General for Justice and Consumers, and Cloud-industry leaders have all contributed to its development, resulting in a robust framework that recognises the unique requirements of the Cloud industry. Cloud providers must ensure that their services - which by design involve accessing and transferring data across the Internet, exposing it to far greater risk than data stored and processed within an organisation's internal network - meet or exceed the GDPR's requirements in order to provide the security and privacy that the market expects. Organisations can achieve this via compliance to the EU Cloud Code of Conduct. The EU Cloud Code of Conduct has already been adopted by major Cloud service organisations, including: Microsoft; Oracle; Salesforce; IBM; Google Cloud; Dropbox; and Alibaba Cloud. Public and business focus on information security and data protection continues to increase in the face of a constantly changing threat landscape and ever-more stringent regulation, and compliance to initiatives such as the EU Cloud Code of Conduct demonstrates to current and potential customers that your organisation is taking data privacy seriously, as well as strengthens your organisation's overall approach to information security management, and defences against data breaches. The EU Data Protection Code of Conduct for Cloud Service Providers provides guidance on how to implement the Code within your organisation. It explores the objectives of the Code, and how compliance can be achieved with or without a pre-existing ISMS (information security management system) within the organisation. Begin your journey to EU Cloud Code of Conduct implementation with our guide to compliance - Buy this book today!

Right First Time - Buying and Integrating Advanced Technology for Project Success (Paperback, One ed.): IT Governance Right First Time - Buying and Integrating Advanced Technology for Project Success (Paperback, One ed.)
IT Governance
R1,486 Discovery Miles 14 860 Ships in 10 - 15 working days

Why do projects fail?The people who plan and execute major projects are often highly skilled and highly regarded. They are not obviously incompetent. Where a project uses external suppliers or contractors as a significant support to project delivery, the risk of a fundamental failure seems to escalate. Is this a failure of project management? A failure of procurement? A failure of both? Or are there other factors at play? This book aims to be a self-help manual. It will enable you to improve your personal and corporate performance. It will also help you ensure that the sub-system elements of a project, where there are 'interfaces' between systems that need to 'talk' to each other, will be effectively managed - with no nasty surprises. Buying and integrating advanced technologyRight First Time - Buying and integrating advanced technology for project success does not pretend to hold the key to a 'nirvana' of project delivery. Rather, it gets straight to the point about buying - and integrating - advanced technology. It recognises that integrating sub-systems is fertile ground for failure and that effective procurement is increasingly important in project delivery. The failure of one sub-system can undermine an entire project, and the integration of sub-components is all too often assumed to be a technical problem that 'technical people' will overcome. Few projects make integration a defined subset of the overall project plan, yet most will benefit from doing so. A project management playbookA management book rather than a technical book, Right First Time - Buying and integrating advanced technology for project success focuses on the difficult issue of sub-system integration in the context of third-party (supply) relationships. If you are responsible for project management and practical delivery, at senior or junior level, it provides lots of practical questions to help you work through the issues, acting as a catalyst for supplementary questions and lines of investigation, focusing on potential problem areas relevant to your own context. Powerful learning outcomes and self-reflective questions at the end of each chapter enable you to create key action points and assess your organisation's approach to improve project management governance and ensure you get it right first time. Project managers, procurement managers, business change managers, commercial managers, mobilisation/transition managers, product managers and contract managers will all find value in this comprehensive guide to managing sub-system integration for project success.

ISO 14001 Step by Step - A Practical Guide (Paperback, 2nd ed.): IT Governance ISO 14001 Step by Step - A Practical Guide (Paperback, 2nd ed.)
IT Governance
R780 Discovery Miles 7 800 Ships in 10 - 15 working days

Take the first steps to ISO 14001 certification with this practical overview. This book provides practical advice on how to achieve compliance with ISO 14001:2015, the international standard for an EMS (environmental management system). With an EMS certified to ISO 14001, you can improve the efficiency of your business operations and fulfil compliance obligations, while reassuring your employees, clients and other stakeholders that you are monitoring your environmental impact. This easy-to-follow guide takes a step-by-step approach, and provides many sample documents to help you understand how to record and monitor your organisation's EMS processes. Ideal for compliance managers, IT and general managers, environmental officers, auditors and trainers, this book will provide you with: The confidence to plan and design an EMS. Detailed descriptions of the ISO 14001:2015 requirements will give you a clear understanding of the standard, even if you lack specialist knowledge or previous experience; Guidance to build stakeholder support for your EMS. Information on why it is important for an organisation to have an environmental policy, and a sample communications procedure will help you to raise awareness of the benefits of implementing an EMS; and Advice on how to become an ISO 14001-certified organisation. The book takes a step-by-step approach to implementing an 1SO 14001-compliant EMS. Key features: A concise summary of the ISO 14001:2015 requirements and how you can meet them. An overview of the documentation needed to achieve ISO 14001:2015 accreditation. Sample documents to help you understand how to record and monitor your organisation's environmental management processes. New for the second edition: Updated for ISO 14001:2015, including terms, definitions and references; Revised approach to take into account requirements to address "risks and opportunities". Your practical guide to implementing an EMS that complies with ISO 14001:2015 - buy this book today to get the help and guidance you need!

The California Privacy Rights ACT (Cpra) - An Implementation and Compliance Guide (Paperback): IT Governance The California Privacy Rights ACT (Cpra) - An Implementation and Compliance Guide (Paperback)
IT Governance
R1,313 Discovery Miles 13 130 Ships in 10 - 15 working days

The CCPA (California Consumer Privacy Act) is a data privacy law that took effect on January 1, 2020. It applied to businesses that collect California residents' personal information, and its privacy requirements are similar to those of the GDPR (General Data Protection Regulation). On May 4, 2020, Californians for Consumer Privacy (an advocacy group, founded by Alistair MacTaggart) announced that it had collected more than 900,000 signatures to qualify the CPRA (California Privacy Rights Act) for the November 2020 ballot. Also known as 'CCPA 2.0', the CPRA enhances privacy protections established by the CCPA and builds on consumer rights. CPRA effectively replaces the CCPA and bolsters privacy protections for California consumers. While many elements of the two laws are similar, there are some striking differences that could impact CPRA implementation plans, including: Limiting deletion rights that apply to unstructured data A new right to data minimization with retention requirements related to personal data New definitions and obligations related to cross-context behavioral advertising Amending breach liability to include an email address in combination with a password or security question Establishing a new regulatory enforcement body: the California Privacy Protection Agency Organizations that fail to comply with the CPRA's requirements are subject to civil penalties of up to $7,500 and a civil suit that gives every affected consumer the right to seek between $100 and $750 in damages per incident, or actual damages if higher. The law is complex and requires careful reading to understand the actual requirements for organizations - The California Privacy Rights Act - An implementation and compliance guide is here to help you. Ensure your business is CPRA compliant with essential guidanceThis book is your ideal resource for understanding the CPRA and how you can implement a strategy to ensure your organization complies with the legislation. It will give you a comprehensive understanding of the legislation by providing definitions of key terms, explanations of the security requirements, details of the breach notification procedure, and covering the penalties for noncompliance. The California Privacy Rights Act - An implementation and compliance guide is essential reading for anyone with business interests in the state of California. Not only does it serve as an introduction to the legislation, it also discusses the challenges a business may face when trying to achieve CPRA compliance. It gives you the confidence to begin your CPRA compliance journey, while highlighting the potential ongoing developments of the CPRA. Buy this book and start implementing your CPRA compliance strategy today!

The Ransomware Threat Landscape - Prepare For, Recognise and Survive Ransomware Attacks (Paperback): IT Governance The Ransomware Threat Landscape - Prepare For, Recognise and Survive Ransomware Attacks (Paperback)
IT Governance
R688 Discovery Miles 6 880 Ships in 10 - 15 working days

The fastest-growing malware in the world The core functionality of ransomware is two-fold: to encrypt data and deliver the ransom message. This encryption can be relatively basic or maddeningly complex, and it might affect only a single device or a whole network. Ransomware is the fastest-growing malware in the world. In 2015, it cost companies around the world $325 million, which rose to $5 billion by 2017 and is set to hit $20 billion in 2021. The threat of ransomware is not going to disappear, and while the number of ransomware attacks remains steady, the damage they cause is significantly increasing. It is the duty of all business leaders to protect their organisations and the data they rely on by doing whatever is reasonably possible to mitigate the risk posed by ransomware. To do that, though, they first need to understand the threats they are facing. The Ransomware Threat Landscape This book sets out clearly how ransomware works, to help business leaders better understand the strategic risks, and explores measures that can be put in place to protect the organisation. These measures are structured so that any organisation can approach them. Those with more resources and more complex environments can build them into a comprehensive system to minimise risks, while smaller organisations can secure their profiles with simpler, more straightforward implementation. Suitable for senior directors, compliance managers, privacy managers, privacy officers, IT staff, security analysts and admin staff - in fact, all staff who use their organisation's network/online systems to perform their role - The Ransomware Threat Landscape - Prepare for, recognise and survive ransomware attacks will help readers understand the ransomware threat they face. From basic cyber hygiene to more advanced controls, the book gives practical guidance on individual activities, introduces implementation steps organisations can take to increase their cyber resilience, and explores why cyber security is imperative. Topics covered include: Introduction About ransomware Basic measures An anti-ransomware The control framework Risk management Controls Maturity Basic controls Additional controls for larger organisations Advanced controls Don't delay - start protecting your organisation from ransomware and buy this book today!

The Cyber Security Handbook - Prepare For, Respond to and Recover from Cyber Attacks (Paperback): IT Governance The Cyber Security Handbook - Prepare For, Respond to and Recover from Cyber Attacks (Paperback)
IT Governance
R1,516 Discovery Miles 15 160 Ships in 10 - 15 working days

In the world as we know it, you can be attacked both physically and virtually. For today's organisations, which rely so heavily on technology - particularly the Internet - to do business, the latter is the far more threatening of the two. The cyber threat landscape is complex and constantly changing. For every vulnerability fixed, another pops up, ripe for exploitation. This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape. Suitable for senior directors (CEO, CISO, CIO), compliance managers, privacy managers, IT managers, security analysts and others, the book is divided into six parts: Part 1: Introduction. The world of cyber security and the approach taken in this book. Part 2: Threats and vulnerabilities. A discussion of a range of threats organisations face, organised by threat category, to help you understand what you are defending yourself against before you start thinking about your actual defences. Part 3: The CRF processes. Detailed discussions of each of the 24 CRF processes, explaining a wide range of security areas by process category and offering guidance on how to implement each. Part 4: Eight steps to implementing cyber security. Our eight-step approach to implementing the cyber security processes you need and maintaining them. Part 5: Reference frameworks. An explanation of how standards and frameworks work, along with their benefits. It also presents ten framework options, introducing you to some of the best-known standards and giving you an idea of the range available. Part 6: Conclusion and appendices. The appendices include a glossary of all the acronyms and abbreviations used in this book. Whether you are just starting out on the road to cyber security or looking to enhance and improve your existing cyber resilience programme, it should be clear that cyber security is no longer optional in today's information age; it is an essential component of business success. Make sure you understand the threats and vulnerabilities your organisation faces and how the Cyber Resilience Framework can help you tackle them. Start your journey to cyber security now - buy this book today!

EU General Data Protection Regulation (GDPR) - An implementation and compliance guide (Paperback, 4th ed.): It Governance... EU General Data Protection Regulation (GDPR) - An implementation and compliance guide (Paperback, 4th ed.)
It Governance Privacy Team
R1,373 Discovery Miles 13 730 Ships in 10 - 15 working days

Understand your GDPR obligations and prioritise the steps you need to take to comply The GDPR gives individuals significant rights over how their personal information is collected and processed, and places a range of obligations on organisations to be more accountable for data protection. The Regulation applies to all data controllers and processors that handle EU residents' personal information. It supersedes the 1995 EU Data Protection Directive and all EU member states' national laws that are based on it - including the UK's DPA (Data Protection Act) 1998. Failure to comply with the Regulation could result in fines of up to 20 million or 4% of annual global turnover - whichever is greater. This guide is a perfect companion for anyone managing a GDPR compliance project. It provides a detailed commentary on the Regulation, explains the changes you need to make to your data protection and information security regimes, and tells you exactly what you need to do to avoid severe financial penalties. Clear and comprehensive guidance to simplify your GDPR compliance project Now in its fourth edition, EU General Data Protection Regulation (GDPR) - An implementation and compliance guide provides clear and comprehensive guidance on the GDPR. It explains the Regulation and sets out the obligations of data processors and controllers in terms you can understand. Topics covered include: The DPO (data protection officer) role, including whether you need one and what they should do; Risk management and DPIAs (data protection impact assessments), including how, when and why to conduct one; Data subjects' rights, including consent and the withdrawal of consent, DSARs (data subject access requests) and how to handle them, and data controllers and processors' obligations; Managing personal data internationally, including updated guidance following the Schrems II ruling; How to adjust your data protection processes to comply with the GDPR, and the best way of demonstrating that compliance; and A full index of the Regulation to help you find the articles and stipulations relevant to your organisation. Supplemental material While most of the EU GDPR's requirements are broadly unchanged in the UK GDPR, the context is quite different and will have knock-on effects. You may need to update contracts regarding EU-UK data transfers, incorporate standard contractual clauses into existing agreements, and update your policies, processes and procedural documentation as a result of these changes. We have published a supplement that sets out specific extra or amended information for this pocket guide. Click here to download the supplement. About the authors The IT Governance Privacy Team, led by Alan Calder, has substantial experience in privacy, data protection, compliance and information security. This practical experience, their understanding of the background and drivers for the GDPR, and the input of expert consultants and trainers are combined in this must-have guide to GDPR compliance. Start your compliance journey now and buy this book today.

The Universal Service Desk - Implementing, Controlling and Improving Service Delivery (Paperback): IT Governance The Universal Service Desk - Implementing, Controlling and Improving Service Delivery (Paperback)
IT Governance
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

The Universal Service Desk (USD) - Implementing, controlling and improving service delivery defines what a USD is, why it is valuable to an organisation and how to build and implement one. It also discusses the evolution of the USD as part of integrated workplace management. Understand the essentials of any USD - buy this book today!

Securing Cloud Services - A Pragmatic Guide (Paperback, 2nd ed.): IT Governance Securing Cloud Services - A Pragmatic Guide (Paperback, 2nd ed.)
IT Governance
R1,535 Discovery Miles 15 350 Ships in 10 - 15 working days

Securing Cloud Services - A pragmatic guide gives an overview of security architecture processes and explains how they may be used to derive an appropriate set of security controls to manage the risks associated with working in the Cloud. Manage the risks associated with Cloud computing - buy this book today!

Cyber Security: Essential Principles to Secure Your Organisation (Paperback): IT Governance Cyber Security: Essential Principles to Secure Your Organisation (Paperback)
IT Governance
R493 Discovery Miles 4 930 Ships in 10 - 15 working days

Cyber Security - Essential principles to secure your organisation takes you through the fundamentals of cyber security, the principles that underpin it, vulnerabilities and threats, and how to defend against attacks. Organisations large and small experience attacks every day, from simple phishing emails to intricate, detailed operations masterminded by criminal gangs, and for every vulnerability fixed, another pops up, ripe for exploitation. Cyber security doesn't have to cost vast amounts of money or take a short ice age to implement. No matter the size of your organisation, improving cyber security helps protect your data and that of your clients, improving business relations and opening the door to new opportunities. This pocket guide will take you through the essentials of cyber security - the principles that underpin it, vulnerabilities and threats and the attackers who use them, and how to defend against them - so you can confidently develop a cyber security programme. Cyber Security - Essential principles to secure your organisation Covers the key differences between cyber and information security; Explains how cyber security is increasingly mandatory and how this ties into data protection, e.g. the Data Protection Act 2018 and the GDPR (General Data Protection Regulation); Focuses on the nature of the problem, looking at technical, physical and human threats and vulnerabilities; Explores the importance of security by design; Gives guidance on why security should be balanced and centralised; and Introduces the concept of using standards and frameworks to manage cyber security. No matter the size of your organisation, cyber security is no longer optional - it is an essential component of business success and a critical defence against the risks of the information age. The only questions left are to decide when and where your journey will begin. Start that journey now - buy this book today!

Iso/Iec 27701:2019: An Introduction to Privacy Information Management (Paperback): IT Governance Iso/Iec 27701:2019: An Introduction to Privacy Information Management (Paperback)
IT Governance
R416 Discovery Miles 4 160 Ships in 12 - 17 working days

ISO/IEC 27701:2019: An introduction to privacy information management offers a concise introduction to the Standard, aiding those organisations looking to improve their privacy information management regime, particularly where ISO/IEC 27701:2019 is involved.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Mercury: Act 1
Imagine Dragons CD R467 Discovery Miles 4 670
LocknLock Pet Dry Food Container (1.6L)
R109 R100 Discovery Miles 1 000
Microsoft Windows 11 Professional DSP…
R3,499 R1,499 Discovery Miles 14 990
Loot
Nadine Gordimer Paperback  (2)
R389 R360 Discovery Miles 3 600
Little Bee's Book of Blooms 15 The Big…
Yuval Zommer Hardcover R195 Discovery Miles 1 950
ZA Body Shaper Slimming Underwear - Tan…
R570 R399 Discovery Miles 3 990
Bunty 380GSM Golf Towel (30x50cm)(3…
R500 R255 Discovery Miles 2 550
Mellerware Swiss - Plastic Floor Fan…
R379 Discovery Miles 3 790
Loot
Nadine Gordimer Paperback  (2)
R389 R360 Discovery Miles 3 600
The Lion King - Blu-Ray + DVD
Blu-ray disc R366 Discovery Miles 3 660

 

Partners