|
Showing 1 - 25 of
110 matches in All Departments
This pocket guide is perfect as a quick reference for PCI
professionals, or as a handy introduction for new staff. It
explains the fundamental concepts of the latest iteration of the
PCI DSS, v3.2.1, making it an ideal training resource. It will
teach you how to protect your customers' cardholder data with best
practice from the Standard.
Considering the pandemic threat in a business continuity context I
thoroughly enjoyed reading Clark's book which is written in a style
that makes it easy for anyone to understand without requiring a
background in medicine or business. I have been involved in
disaster management planning for the past ten years and yet I still
found this book both enlightening and extremely informative. Dr
Tanya Melillo MD, MSc(Dist), PhD This informative book is written
in an easy going and conversational manner, but the message it
brings to the table is critical to understanding the meaning of any
forthcoming pandemic threat and considerations of how to mitigate
the effects, where possible, to you and your organisation Owen
Gregory MSc BA (Hons) MBCI MBCS The increase in commercial aviation
and international travel means that pandemics now spread faster
than ever before. Seasonal flu pandemics, zoonotic contagions such
as Ebola, swine flu and avian flu (e.g. H5N1 and H7N9), and
respiratory syndromes such as SARS and MERS have affected millions
worldwide. Add the ever-present threat of terrorism and biological
warfare, and the possibility of large proportions of your workforce
being incapacitated is a lot stronger than you might think. You may
well have prepared for limited business interruptions, but how
would your business fare if 50% or more of your employees,
including those you rely on to execute your business continuity
plan, were afflicted by illness - or worse? Although nothing can be
done to prevent pandemics, their impact can be significantly
mitigated. Business Continuity and the Pandemic Threat explains
how. Product overview The book is divided into two parts, which
examine the pandemic threat and explain how businesses can address
it: Part I: Understanding the Threat The first, shorter, part
provides the reader with a detailed overview of the challenge that
pandemic threats can present. It uses historical examples (such as
the 1918-19 Spanish Flu outbreak, which killed 50 million) to
illustrate how pandemics can have devastating effects not only on
the global population but also on critical infrastructure, the
global economy and society. Part II: Preparing for the Inevitable
The second part of the book considers the actions that can be taken
at a global, national, corporate and individual level to mitigate
the risk and limit the damage of pandemic incidents. It provides
guidance on creating and validating a pandemic plan, and explains
how it integrates with a business continuity plan. Comprehensive
case studies are provided throughout. Topics covered include: The
World Health Organisation (WHO)'s pandemic phases and the Centre
for Disease Control (CDC)'s Pandemic Severity Index Preventive
control measures Crisis management and the composition of a crisis
management team Dealing with cash-flow, staff absenteeism, home
working and supply chain management Communications and media plans
Pandemic issues for HR The threat to critical national
infrastructure Health service contingency plans and first
responders' business continuity plans The provision of vaccines and
antiviral medicines, including relevant ethical issues Take your
business continuity plan to the next level: ensure your
organisation survives a pandemic with a substantially depleted
workforce. Buy Business Continuity and the Pandemic Threat today.
About the author A Fellow of the Institute of Business Continuity
Management and Member of the Business Continuity Institute, Robert
A. Clark is also a Fellow of the British Computer Society and a
Member of the Security Institute. His career includes 15 years with
IBM and 11 years with Fujitsu Services working with clients on BCM
related assignments. He is now a freelance business continuity
consultant at www.bcm-consultancy.com.
The true power of Agile methodologies is not technology; it is
business value generation. Use Agile methodologies to turn your IT
solution challenges into high business-value returns All too often,
IT solutions are plagued by budget overruns, missed deadlines,
low-quality outputs and dissatisfied users. Agile methodologies are
proven, common-sense methods for substantially increasing the
relevance, flexibility and bottom-line business value of your
software solutions. Quantify and measure the benefits that Agile
methodologies can deliver to your organisation. Agile
methodologies, such as Scrum, DSDM, FDD, Lean, XP and Kanban, are
proven approaches for applying the finite resources of an
organisation to deliver high business-value software solutions on
time and within allocated budgets. These methodologies protect
organisations from wasting their IT budgets by replacing large
upfront financial commitments with incremental investment based on
the ongoing business value of delivered software. They encourage
collaboration with key stakeholders, empower staff to regularly
deliver bottom-line value, and ensure that IT solutions are
responsive to ongoing organisational and market changes. Read this
guide and ... Understand the 10 core business benefits of Agile. At
the heart of Agile methodologies are 10 core business benefits that
enable organisations to maximise their IT investments, including:
Better risk management, ongoing control of budget expenditure,
better alignment with business requirements, and substantially
higher quality IT solutions. Agile: An Executive Guide details each
of these benefits from a strategic senior management perspective.
Identify which Agile methodologies align with the specific needs of
your organisation. Agile: An Executive Guide provides you with
tools to assess your organisational culture, structure and dynamic
in order to determine whether Agile methodologies are suitable to
your specific needs, and to select those Agile methodologies that
are the best fit for your organisation. Get the essential
information you need to implement Agile within your organisation.
Agile: An Executive Guide is full of practical advice, including
detailed guidelines to help you: Choose the right kick-off point
for Agile within your organisation; avoid common traps; monitor and
measure your investment; and broaden the use of Agile methodologies
into other areas of your organisation. It includes step-by-step
guidelines, interactive tools and targeted questionnaires to help
you and your staff successfully implement these methodologies.
Agile: An Executive Guide describes Agile methodologies in clear
business language specifically written for business professionals.
It will help you make realistic business-driven decisions on
whether Agile methodologies are appropriate for your organisation;
whether you are looking to consolidate your IT overheads, to
provide better software solutions to your clients, or to have more
control over your IT expenditures. This guide provides practical,
proven ways to introduce, incorporate and leverage Agile
methodologies to maximise your business returns.
An ideal introduction and a quick reference to PCI DSS version 3.1
All businesses that accept payment cards are prey for hackers and
criminal gangs trying to steal financial information and commit
identity fraud. The PCI DSS (Payment Card Industry Data Security
Standard) exists to ensure that businesses process credit and debit
card orders in a way that protects cardholder data effectively. All
organisations that accept, store, transmit or process cardholder
data must comply with the Standard; failure to do so can have
serious consequences for their ability to process card payments.
Product overview Co-written by a PCI QSA (Qualified Security
Assessor) and updated to cover PCI DSS version 3.1, this handy
pocket guide provides all the information you need to consider as
you approach the PCI DSS. It is also an ideal training resource for
anyone in your organisation who deals with payment card processing.
Coverage includes: An overview of Payment Card Industry Data
Security Standard v3.1. A PCI self-assessment questionnaire (SAQ).
Procedures and qualifications. An overview of the Payment
Application Data Security Standard. Contents 1.What is the Payment
Card Industry Data Security Standard (PCI DSS)? 2.What is the Scope
of the PCI DSS? 3.Compliance and Compliance Programmes
4.Consequences of a Breach 5.How do you Comply with the
Requirements of the Standard? 6.Maintaining Compliance 7.PCI DSS -
The Standard 8.Aspects of PCI DSS Compliance 9.The PCI
Self-Assessment Questionnaire 10.Procedures and Qualifications
11.The PCI DSS and ISO/IEC 27001 12.The Payment Application Data
Security Standard (PA-DSS) 13.PIN Transaction Security (PTS) About
the authors Alan Calder is the founder and executive chairman of IT
Governance Ltd, an information, advice and consultancy firm that
helps company boards tackle IT governance, risk management,
compliance and information security issues. He has many years of
senior management experience in the private and public sectors.
Geraint Williams is a knowledgeable and experienced senior
information security consultant and PCI QSA, with a strong
technical background and experience of the PCI DSS and security
testing. Geraint has provided consultancy on implementation of the
PCI DSS, and conducted audits with a wide range of merchants and
service providers. He has performed penetration testing and
vulnerability assessments for various clients. Geraint leads the IT
Governance CISSP Accelerated Training Programme, as well as the PCI
Foundation and Implementer training courses. He has broad technical
knowledge of security and IT infrastructure, including high
performance computing, and Cloud computing. His certifications
include CISSP, PCI QSA, CREST Registered Tester, CEH and CHFI."
When is a gift not a gift? When it's a bribe. For many, corporate
hospitality oils the wheels of commerce. But where do you draw the
line? Bribes, incentives and inducements are not just a matter of
used banknotes stuffed in brown envelopes. Expenses, corporate
settlement of personal bills, gifts and hospitality can all be used
to influence business partners, clients and contractors. Can you
afford unlimited fines? Under the Bribery Act 2010, a maximum of
ten years' imprisonment and an unlimited fine may be imposed for
offering, promising, giving, requesting, agreeing, receiving or
accepting bribes. With such strict penalties, it's astonishing that
so few companies have few or no measures in place to ensure that
they are not liable for prosecution. This is especially astonishing
as the Ministry of Justice's Quick start guide to the Bribery Act
makes it clear that "There is a full defence if you can show you
had adequate procedures in place to prevent bribery." Such
procedures can be found in BS 10500:2010, the British Standard for
anti-bribery management systems (ABMSs). How to implement an ABMS
An Introduction to Anti-Bribery Management Systems (BS 10500)
explains how to implement an ABMS that meets the requirements of BS
10500, from initial gap analysis to due diligence management: * An
introduction to BS 10500 * An explanation of an ABMS * Management
processes within an ABMS * Implementing an ABMS * Risk assessment
in due diligence * Whistleblowing and bribery investigations *
Internal auditing and corrective action * Certification to BS 10500
It provides helpful guidance on the importance of clearly defining
policies; logging gifts and hospitality in auditable records;
ensuring a consistent approach across the organisation; controls
for contractors; facilitation payments; charitable and political
donations; risk assessment in due diligence; whistle-blowing and
bribery investigations; and internal auditing and corrective
action. Meet the stringent requirements of the Bribery Act Not only
will a BS 10500-compliant ABMS help your organisation prove its
probity by meeting the stringent requirements of the Bribery Act,
it can also be adapted to most legal or compliance systems. An
ethical approach to business is not just a legal obligation but a
way to protect your reputation. About the author Alan Field, MA,
LL.B (Hons), PgC, MCQI CQP, MIIRSM, AIEMA, GIFireE, GradIOSH is a
Chartered Quality Professional, an IRCA Registered Lead Auditor and
member of the Society of Authors. Alan has particular expertise in
auditing and assessing anti-bribery management systems to BS 10500
and public-sector counter-fraud systems to ISO9001. Alan has many
years' experience with quality and integrated management systems in
the legal, financial, property services and project management
sectors in auditing, assessment and gap analysis roles. Your
company's integrity is important. An Introduction to Anti-Bribery
Management Systems (BS 10500) shows you how to maintain and prove
it.
Passwords are not enough A password is a single authentication
factor - anyone who has it can use it. No matter how strong it is,
if it's lost or stolen, it's entirely useless at keeping
information private. To secure your data properly, you also need to
use a separate, secondary authentication factor. Data breaches are
now commonplace In recent years, large-scale data breaches have
increased dramatically in both severity and number, and the loss of
personal information - including password data - has become
commonplace. Furthermore, the fact that rapidly evolving
password-cracking technology and the habitual use - and reuse - of
weak passwords has rendered the security of username and password
combinations negligible, and you have a very strong argument for
more robust identity authentication. Consumers are beginning to
realise just how exposed their personal and financial information
is, and are demanding better security from the organisations that
collect, process and store it. This has led to a rise in the
adoption of two-factor authentication (TFA or 2FA). In the field of
authentication security, the method of proving identity can be
broken down into three characteristics - roughly summarised as
'what you have', 'what you are' and 'what you know'. Two-factor
authentication relies on the combination of two of these factors.
Product overview TFA is nothing new. It's mandated by requirement
8.3 of the Payment Card Industry Data Security Standard (PCI DSS)
and banks have been using it for years, combining payment cards
('what you have') and PINs ('what you know'). If you use online
banking you'll probably also have a chip authentication programme
(CAP) keypad, which generates a one-time password (OTP). What is
new is TFA's rising adoption beyond the financial sector.
Two-Factor Authentication provides a comprehensive evaluation of
popular secondary authentication methods, such as: Hardware-based
OTP generation SMS-based OTP delivery Phone call-based mechanisms
Geolocation-aware authentication Push notification-based
authentication Biometric authentication factors Smart card
verification As well as examining MFA (multi-factor
authentication), 2SV (two-step verification) and strong
authentication (authentication that goes beyond passwords, using
security questions or layered security), the book also discusses
the wider application of TFA for the average consumer, for example
at such organisations as Google, Amazon and Facebook. It also
considers the future of multi-factor authentication, including its
application to the Internet of Things (IoT). Increasing your
password strength will do absolutely nothing to protect you from
online hacking, phishing attacks or corporate data breaches. If
you're concerned about the security of your personal and financial
data, you need to read this book. About the author Mark Stanislav
is an information technology professional with over a decade's
varied experience in systems administration, web application
development and information security. He is currently a senior
security consultant for the Strategic Services team at Rapid7. Mark
has spoken internationally at nearly 100 events, including RSA, DEF
CON, SecTor, SOURCE Boston, ShmooCon and THOTCON. News outlets such
as the Wall Street Journal, Al Jazeera America, Fox Business,
MarketWatch, CNN Money, Yahoo Finance, Marketplace and The Register
have featured Mark's research, initiatives and insights on
information security.
As nations race to hone contact-tracing efforts, the world's
experts consider strategies for maximum transparency and impact. As
public health professionals around the world work tirelessly to
respond to the COVID-19 pandemic, it is clear that traditional
methods of contact tracing need to be augmented in order to help
address a public health crisis of unprecedented scope. Innovators
worldwide are racing to develop and implement novel public-facing
technology solutions, including digital contact tracing technology.
These technological products may aid public health surveillance and
containment strategies for this pandemic and become part of the
larger toolbox for future infectious outbreak prevention and
control. As technology evolves in an effort to meet our current
moment, Johns Hopkins Project on Ethics and Governance of Digital
Contact Tracing Technologies-a rapid research and expert consensus
group effort led by Dr. Jeffrey P. Kahn of the Johns Hopkins Berman
Institute of Bioethics in collaboration with the university's
Center for Health Security-carried out an in-depth analysis of the
technology and the issues it raises. Drawing on this analysis, they
produced a report that includes detailed recommendations for
technology companies, policymakers, institutions, employers, and
the public. The project brings together perspectives from
bioethics, health security, public health, technology development,
engineering, public policy, and law to wrestle with the complex
interactions of the many facets of the technology and its
applications. This team of experts from Johns Hopkins University
and other world-renowned institutions has crafted clear and
detailed guidelines to help manage the creation, implementation,
and application of digital contact tracing. Digital Contact Tracing
for Pandemic Response is the essential resource for this
fast-moving crisis. Contributors: Joseph Ali, JD; Anne Barnhill,
PhD; Anita Cicero, JD; Katelyn Esmonde, PhD; Amelia Hood, MA; Brian
Hutler, Phd, JD; Jeffrey P. Kahn, PhD, MPH; Alan Regenberg, MBE;
Crystal Watson, DrPH, MPH; Matthew Watson; Robert Califf, MD, MACC;
Ruth Faden, PhD, MPH; Divya Hosangadi, MSPH; Nancy Kass, ScD; Alain
Labrique, PhD, MHS, MS; Deven McGraw, JD, MPH, LLM; Michelle Mello,
JD, PhD; Michael Parker, BEd (Hons), MA, PhD; Stephen Ruckman, JD,
MSc, MAR; Lainie Rutkow, JD, MPH, PhD; Josh Sharfstein, MD; Jeremy
Sugarman, MD, MPH, MA; Eric Toner, MD; Mar Trotochaud, MSPH; Effy
Vayena, PhD; Tal Zarsky, JSD, LLM, LLB
A global perspective on AI This book will provide a global
perspective on AI and the challenges it represents, and will focus
on the digital ethics surrounding AI technology.
This book is about cyber security. In Part 1, the author discusses
his thoughts on the cyber security industry and how those that
operate within it should approach their role with the mindset of an
artist. Part 2 explores the work of Sun Tzu's The Art of War.
An accessible introduction to the most prevalent cyber threats in
our current climate, this book discusses cyber terrorism, phishing,
and ransomware attacks, and provides advice on how to mitigate such
threats in our personal and professional lives.
The EU Data Protection Code of Conduct for Cloud Service Providers
- A guide to complianceFormally founded in 2017, the EU Data
Protection Code of Conduct for Cloud Service Providers (otherwise
known as the EU Cloud Code of Conduct; the Code) is a voluntary
code of conduct created specifically to support GDPR compliance
within the B2B (business-to-business) Cloud industry. The EU
Commission, the Article 29 Working Party (now the European Data
Protection Board (EDPB)), the EU Directorate-General for Justice
and Consumers, and Cloud-industry leaders have all contributed to
its development, resulting in a robust framework that recognises
the unique requirements of the Cloud industry. Cloud providers must
ensure that their services - which by design involve accessing and
transferring data across the Internet, exposing it to far greater
risk than data stored and processed within an organisation's
internal network - meet or exceed the GDPR's requirements in order
to provide the security and privacy that the market expects.
Organisations can achieve this via compliance to the EU Cloud Code
of Conduct. The EU Cloud Code of Conduct has already been adopted
by major Cloud service organisations, including: Microsoft; Oracle;
Salesforce; IBM; Google Cloud; Dropbox; and Alibaba Cloud. Public
and business focus on information security and data protection
continues to increase in the face of a constantly changing threat
landscape and ever-more stringent regulation, and compliance to
initiatives such as the EU Cloud Code of Conduct demonstrates to
current and potential customers that your organisation is taking
data privacy seriously, as well as strengthens your organisation's
overall approach to information security management, and defences
against data breaches. The EU Data Protection Code of Conduct for
Cloud Service Providers provides guidance on how to implement the
Code within your organisation. It explores the objectives of the
Code, and how compliance can be achieved with or without a
pre-existing ISMS (information security management system) within
the organisation. Begin your journey to EU Cloud Code of Conduct
implementation with our guide to compliance - Buy this book today!
Why do projects fail?The people who plan and execute major projects
are often highly skilled and highly regarded. They are not
obviously incompetent. Where a project uses external suppliers or
contractors as a significant support to project delivery, the risk
of a fundamental failure seems to escalate. Is this a failure of
project management? A failure of procurement? A failure of both? Or
are there other factors at play? This book aims to be a self-help
manual. It will enable you to improve your personal and corporate
performance. It will also help you ensure that the sub-system
elements of a project, where there are 'interfaces' between systems
that need to 'talk' to each other, will be effectively managed -
with no nasty surprises. Buying and integrating advanced
technologyRight First Time - Buying and integrating advanced
technology for project success does not pretend to hold the key to
a 'nirvana' of project delivery. Rather, it gets straight to the
point about buying - and integrating - advanced technology. It
recognises that integrating sub-systems is fertile ground for
failure and that effective procurement is increasingly important in
project delivery. The failure of one sub-system can undermine an
entire project, and the integration of sub-components is all too
often assumed to be a technical problem that 'technical people'
will overcome. Few projects make integration a defined subset of
the overall project plan, yet most will benefit from doing so. A
project management playbookA management book rather than a
technical book, Right First Time - Buying and integrating advanced
technology for project success focuses on the difficult issue of
sub-system integration in the context of third-party (supply)
relationships. If you are responsible for project management and
practical delivery, at senior or junior level, it provides lots of
practical questions to help you work through the issues, acting as
a catalyst for supplementary questions and lines of investigation,
focusing on potential problem areas relevant to your own context.
Powerful learning outcomes and self-reflective questions at the end
of each chapter enable you to create key action points and assess
your organisation's approach to improve project management
governance and ensure you get it right first time. Project
managers, procurement managers, business change managers,
commercial managers, mobilisation/transition managers, product
managers and contract managers will all find value in this
comprehensive guide to managing sub-system integration for project
success.
Take the first steps to ISO 14001 certification with this practical
overview. This book provides practical advice on how to achieve
compliance with ISO 14001:2015, the international standard for an
EMS (environmental management system). With an EMS certified to ISO
14001, you can improve the efficiency of your business operations
and fulfil compliance obligations, while reassuring your employees,
clients and other stakeholders that you are monitoring your
environmental impact. This easy-to-follow guide takes a
step-by-step approach, and provides many sample documents to help
you understand how to record and monitor your organisation's EMS
processes. Ideal for compliance managers, IT and general managers,
environmental officers, auditors and trainers, this book will
provide you with: The confidence to plan and design an EMS.
Detailed descriptions of the ISO 14001:2015 requirements will give
you a clear understanding of the standard, even if you lack
specialist knowledge or previous experience; Guidance to build
stakeholder support for your EMS. Information on why it is
important for an organisation to have an environmental policy, and
a sample communications procedure will help you to raise awareness
of the benefits of implementing an EMS; and Advice on how to become
an ISO 14001-certified organisation. The book takes a step-by-step
approach to implementing an 1SO 14001-compliant EMS. Key features:
A concise summary of the ISO 14001:2015 requirements and how you
can meet them. An overview of the documentation needed to achieve
ISO 14001:2015 accreditation. Sample documents to help you
understand how to record and monitor your organisation's
environmental management processes. New for the second edition:
Updated for ISO 14001:2015, including terms, definitions and
references; Revised approach to take into account requirements to
address "risks and opportunities". Your practical guide to
implementing an EMS that complies with ISO 14001:2015 - buy this
book today to get the help and guidance you need!
The CCPA (California Consumer Privacy Act) is a data privacy law
that took effect on January 1, 2020. It applied to businesses that
collect California residents' personal information, and its privacy
requirements are similar to those of the GDPR (General Data
Protection Regulation). On May 4, 2020, Californians for Consumer
Privacy (an advocacy group, founded by Alistair MacTaggart)
announced that it had collected more than 900,000 signatures to
qualify the CPRA (California Privacy Rights Act) for the November
2020 ballot. Also known as 'CCPA 2.0', the CPRA enhances privacy
protections established by the CCPA and builds on consumer rights.
CPRA effectively replaces the CCPA and bolsters privacy protections
for California consumers. While many elements of the two laws are
similar, there are some striking differences that could impact CPRA
implementation plans, including: Limiting deletion rights that
apply to unstructured data A new right to data minimization with
retention requirements related to personal data New definitions and
obligations related to cross-context behavioral advertising
Amending breach liability to include an email address in
combination with a password or security question Establishing a new
regulatory enforcement body: the California Privacy Protection
Agency Organizations that fail to comply with the CPRA's
requirements are subject to civil penalties of up to $7,500 and a
civil suit that gives every affected consumer the right to seek
between $100 and $750 in damages per incident, or actual damages if
higher. The law is complex and requires careful reading to
understand the actual requirements for organizations - The
California Privacy Rights Act - An implementation and compliance
guide is here to help you. Ensure your business is CPRA compliant
with essential guidanceThis book is your ideal resource for
understanding the CPRA and how you can implement a strategy to
ensure your organization complies with the legislation. It will
give you a comprehensive understanding of the legislation by
providing definitions of key terms, explanations of the security
requirements, details of the breach notification procedure, and
covering the penalties for noncompliance. The California Privacy
Rights Act - An implementation and compliance guide is essential
reading for anyone with business interests in the state of
California. Not only does it serve as an introduction to the
legislation, it also discusses the challenges a business may face
when trying to achieve CPRA compliance. It gives you the confidence
to begin your CPRA compliance journey, while highlighting the
potential ongoing developments of the CPRA. Buy this book and start
implementing your CPRA compliance strategy today!
The fastest-growing malware in the world The core functionality of
ransomware is two-fold: to encrypt data and deliver the ransom
message. This encryption can be relatively basic or maddeningly
complex, and it might affect only a single device or a whole
network. Ransomware is the fastest-growing malware in the world. In
2015, it cost companies around the world $325 million, which rose
to $5 billion by 2017 and is set to hit $20 billion in 2021. The
threat of ransomware is not going to disappear, and while the
number of ransomware attacks remains steady, the damage they cause
is significantly increasing. It is the duty of all business leaders
to protect their organisations and the data they rely on by doing
whatever is reasonably possible to mitigate the risk posed by
ransomware. To do that, though, they first need to understand the
threats they are facing. The Ransomware Threat Landscape This book
sets out clearly how ransomware works, to help business leaders
better understand the strategic risks, and explores measures that
can be put in place to protect the organisation. These measures are
structured so that any organisation can approach them. Those with
more resources and more complex environments can build them into a
comprehensive system to minimise risks, while smaller organisations
can secure their profiles with simpler, more straightforward
implementation. Suitable for senior directors, compliance managers,
privacy managers, privacy officers, IT staff, security analysts and
admin staff - in fact, all staff who use their organisation's
network/online systems to perform their role - The Ransomware
Threat Landscape - Prepare for, recognise and survive ransomware
attacks will help readers understand the ransomware threat they
face. From basic cyber hygiene to more advanced controls, the book
gives practical guidance on individual activities, introduces
implementation steps organisations can take to increase their cyber
resilience, and explores why cyber security is imperative. Topics
covered include: Introduction About ransomware Basic measures An
anti-ransomware The control framework Risk management Controls
Maturity Basic controls Additional controls for larger
organisations Advanced controls Don't delay - start protecting your
organisation from ransomware and buy this book today!
In the world as we know it, you can be attacked both physically and
virtually. For today's organisations, which rely so heavily on
technology - particularly the Internet - to do business, the latter
is the far more threatening of the two. The cyber threat landscape
is complex and constantly changing. For every vulnerability fixed,
another pops up, ripe for exploitation. This book is a
comprehensive cyber security implementation manual which gives
practical guidance on the individual activities identified in the
IT Governance Cyber Resilience Framework (CRF) that can help
organisations become cyber resilient and combat the cyber threat
landscape. Suitable for senior directors (CEO, CISO, CIO),
compliance managers, privacy managers, IT managers, security
analysts and others, the book is divided into six parts: Part 1:
Introduction. The world of cyber security and the approach taken in
this book. Part 2: Threats and vulnerabilities. A discussion of a
range of threats organisations face, organised by threat category,
to help you understand what you are defending yourself against
before you start thinking about your actual defences. Part 3: The
CRF processes. Detailed discussions of each of the 24 CRF
processes, explaining a wide range of security areas by process
category and offering guidance on how to implement each. Part 4:
Eight steps to implementing cyber security. Our eight-step approach
to implementing the cyber security processes you need and
maintaining them. Part 5: Reference frameworks. An explanation of
how standards and frameworks work, along with their benefits. It
also presents ten framework options, introducing you to some of the
best-known standards and giving you an idea of the range available.
Part 6: Conclusion and appendices. The appendices include a
glossary of all the acronyms and abbreviations used in this book.
Whether you are just starting out on the road to cyber security or
looking to enhance and improve your existing cyber resilience
programme, it should be clear that cyber security is no longer
optional in today's information age; it is an essential component
of business success. Make sure you understand the threats and
vulnerabilities your organisation faces and how the Cyber
Resilience Framework can help you tackle them. Start your journey
to cyber security now - buy this book today!
Understand your GDPR obligations and prioritise the steps you need
to take to comply The GDPR gives individuals significant rights
over how their personal information is collected and processed, and
places a range of obligations on organisations to be more
accountable for data protection. The Regulation applies to all data
controllers and processors that handle EU residents' personal
information. It supersedes the 1995 EU Data Protection Directive
and all EU member states' national laws that are based on it -
including the UK's DPA (Data Protection Act) 1998. Failure to
comply with the Regulation could result in fines of up to 20
million or 4% of annual global turnover - whichever is greater.
This guide is a perfect companion for anyone managing a GDPR
compliance project. It provides a detailed commentary on the
Regulation, explains the changes you need to make to your data
protection and information security regimes, and tells you exactly
what you need to do to avoid severe financial penalties. Clear and
comprehensive guidance to simplify your GDPR compliance project Now
in its fourth edition, EU General Data Protection Regulation (GDPR)
- An implementation and compliance guide provides clear and
comprehensive guidance on the GDPR. It explains the Regulation and
sets out the obligations of data processors and controllers in
terms you can understand. Topics covered include: The DPO (data
protection officer) role, including whether you need one and what
they should do; Risk management and DPIAs (data protection impact
assessments), including how, when and why to conduct one; Data
subjects' rights, including consent and the withdrawal of consent,
DSARs (data subject access requests) and how to handle them, and
data controllers and processors' obligations; Managing personal
data internationally, including updated guidance following the
Schrems II ruling; How to adjust your data protection processes to
comply with the GDPR, and the best way of demonstrating that
compliance; and A full index of the Regulation to help you find the
articles and stipulations relevant to your organisation.
Supplemental material While most of the EU GDPR's requirements are
broadly unchanged in the UK GDPR, the context is quite different
and will have knock-on effects. You may need to update contracts
regarding EU-UK data transfers, incorporate standard contractual
clauses into existing agreements, and update your policies,
processes and procedural documentation as a result of these
changes. We have published a supplement that sets out specific
extra or amended information for this pocket guide. Click here to
download the supplement. About the authors The IT Governance
Privacy Team, led by Alan Calder, has substantial experience in
privacy, data protection, compliance and information security. This
practical experience, their understanding of the background and
drivers for the GDPR, and the input of expert consultants and
trainers are combined in this must-have guide to GDPR compliance.
Start your compliance journey now and buy this book today.
The Universal Service Desk (USD) - Implementing, controlling and
improving service delivery defines what a USD is, why it is
valuable to an organisation and how to build and implement one. It
also discusses the evolution of the USD as part of integrated
workplace management. Understand the essentials of any USD - buy
this book today!
Securing Cloud Services - A pragmatic guide gives an overview of
security architecture processes and explains how they may be used
to derive an appropriate set of security controls to manage the
risks associated with working in the Cloud. Manage the risks
associated with Cloud computing - buy this book today!
Cyber Security - Essential principles to secure your organisation
takes you through the fundamentals of cyber security, the
principles that underpin it, vulnerabilities and threats, and how
to defend against attacks. Organisations large and small experience
attacks every day, from simple phishing emails to intricate,
detailed operations masterminded by criminal gangs, and for every
vulnerability fixed, another pops up, ripe for exploitation. Cyber
security doesn't have to cost vast amounts of money or take a short
ice age to implement. No matter the size of your organisation,
improving cyber security helps protect your data and that of your
clients, improving business relations and opening the door to new
opportunities. This pocket guide will take you through the
essentials of cyber security - the principles that underpin it,
vulnerabilities and threats and the attackers who use them, and how
to defend against them - so you can confidently develop a cyber
security programme. Cyber Security - Essential principles to secure
your organisation Covers the key differences between cyber and
information security; Explains how cyber security is increasingly
mandatory and how this ties into data protection, e.g. the Data
Protection Act 2018 and the GDPR (General Data Protection
Regulation); Focuses on the nature of the problem, looking at
technical, physical and human threats and vulnerabilities; Explores
the importance of security by design; Gives guidance on why
security should be balanced and centralised; and Introduces the
concept of using standards and frameworks to manage cyber security.
No matter the size of your organisation, cyber security is no
longer optional - it is an essential component of business success
and a critical defence against the risks of the information age.
The only questions left are to decide when and where your journey
will begin. Start that journey now - buy this book today!
ISO/IEC 27701:2019: An introduction to privacy information
management offers a concise introduction to the Standard, aiding
those organisations looking to improve their privacy information
management regime, particularly where ISO/IEC 27701:2019 is
involved.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R389
R360
Discovery Miles 3 600
Loot
Nadine Gordimer
Paperback
(2)
R389
R360
Discovery Miles 3 600
|