Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 25 of 50 matches in All Departments
An ideal introduction and a quick reference to PCI DSS version 3.1 All businesses that accept payment cards are prey for hackers and criminal gangs trying to steal financial information and commit identity fraud. The PCI DSS (Payment Card Industry Data Security Standard) exists to ensure that businesses process credit and debit card orders in a way that protects cardholder data effectively. All organisations that accept, store, transmit or process cardholder data must comply with the Standard; failure to do so can have serious consequences for their ability to process card payments. Product overview Co-written by a PCI QSA (Qualified Security Assessor) and updated to cover PCI DSS version 3.1, this handy pocket guide provides all the information you need to consider as you approach the PCI DSS. It is also an ideal training resource for anyone in your organisation who deals with payment card processing. Coverage includes: An overview of Payment Card Industry Data Security Standard v3.1. A PCI self-assessment questionnaire (SAQ). Procedures and qualifications. An overview of the Payment Application Data Security Standard. Contents 1.What is the Payment Card Industry Data Security Standard (PCI DSS)? 2.What is the Scope of the PCI DSS? 3.Compliance and Compliance Programmes 4.Consequences of a Breach 5.How do you Comply with the Requirements of the Standard? 6.Maintaining Compliance 7.PCI DSS - The Standard 8.Aspects of PCI DSS Compliance 9.The PCI Self-Assessment Questionnaire 10.Procedures and Qualifications 11.The PCI DSS and ISO/IEC 27001 12.The Payment Application Data Security Standard (PA-DSS) 13.PIN Transaction Security (PTS) About the authors Alan Calder is the founder and executive chairman of IT Governance Ltd, an information, advice and consultancy firm that helps company boards tackle IT governance, risk management, compliance and information security issues. He has many years of senior management experience in the private and public sectors. Geraint Williams is a knowledgeable and experienced senior information security consultant and PCI QSA, with a strong technical background and experience of the PCI DSS and security testing. Geraint has provided consultancy on implementation of the PCI DSS, and conducted audits with a wide range of merchants and service providers. He has performed penetration testing and vulnerability assessments for various clients. Geraint leads the IT Governance CISSP Accelerated Training Programme, as well as the PCI Foundation and Implementer training courses. He has broad technical knowledge of security and IT infrastructure, including high performance computing, and Cloud computing. His certifications include CISSP, PCI QSA, CREST Registered Tester, CEH and CHFI."
When is a gift not a gift? When it's a bribe. For many, corporate hospitality oils the wheels of commerce. But where do you draw the line? Bribes, incentives and inducements are not just a matter of used banknotes stuffed in brown envelopes. Expenses, corporate settlement of personal bills, gifts and hospitality can all be used to influence business partners, clients and contractors. Can you afford unlimited fines? Under the Bribery Act 2010, a maximum of ten years' imprisonment and an unlimited fine may be imposed for offering, promising, giving, requesting, agreeing, receiving or accepting bribes. With such strict penalties, it's astonishing that so few companies have few or no measures in place to ensure that they are not liable for prosecution. This is especially astonishing as the Ministry of Justice's Quick start guide to the Bribery Act makes it clear that "There is a full defence if you can show you had adequate procedures in place to prevent bribery." Such procedures can be found in BS 10500:2010, the British Standard for anti-bribery management systems (ABMSs). How to implement an ABMS An Introduction to Anti-Bribery Management Systems (BS 10500) explains how to implement an ABMS that meets the requirements of BS 10500, from initial gap analysis to due diligence management: * An introduction to BS 10500 * An explanation of an ABMS * Management processes within an ABMS * Implementing an ABMS * Risk assessment in due diligence * Whistleblowing and bribery investigations * Internal auditing and corrective action * Certification to BS 10500 It provides helpful guidance on the importance of clearly defining policies; logging gifts and hospitality in auditable records; ensuring a consistent approach across the organisation; controls for contractors; facilitation payments; charitable and political donations; risk assessment in due diligence; whistle-blowing and bribery investigations; and internal auditing and corrective action. Meet the stringent requirements of the Bribery Act Not only will a BS 10500-compliant ABMS help your organisation prove its probity by meeting the stringent requirements of the Bribery Act, it can also be adapted to most legal or compliance systems. An ethical approach to business is not just a legal obligation but a way to protect your reputation. About the author Alan Field, MA, LL.B (Hons), PgC, MCQI CQP, MIIRSM, AIEMA, GIFireE, GradIOSH is a Chartered Quality Professional, an IRCA Registered Lead Auditor and member of the Society of Authors. Alan has particular expertise in auditing and assessing anti-bribery management systems to BS 10500 and public-sector counter-fraud systems to ISO9001. Alan has many years' experience with quality and integrated management systems in the legal, financial, property services and project management sectors in auditing, assessment and gap analysis roles. Your company's integrity is important. An Introduction to Anti-Bribery Management Systems (BS 10500) shows you how to maintain and prove it.
This book is about cyber security. In Part 1, the author discusses his thoughts on the cyber security industry and how those that operate within it should approach their role with the mindset of an artist. Part 2 explores the work of Sun Tzu's The Art of War.
An accessible introduction to the most prevalent cyber threats in our current climate, this book discusses cyber terrorism, phishing, and ransomware attacks, and provides advice on how to mitigate such threats in our personal and professional lives.
A global perspective on AI This book will provide a global perspective on AI and the challenges it represents, and will focus on the digital ethics surrounding AI technology.
Ensure the success of your security programme by understanding users' motivations"This book cuts to the heart of many of the challenges in risk management, providing advice and tips from interviews as well as models that can be employed easily. Leron manages to do this without being patronising or prescriptive, making it an easy read with some very real practical takeaways."Thom Langford, Chief Information Security Officer at Publicis Groupe"Based on real world examples the book provides valuable insights into the relationship of information security, compliance, business economics and decision theory. Drawing on interdisciplinary studies, commentary from the field and his own research Leron gives the reader the necessary background and practical tools to drive improvements in their own information security program."Daniel Schatz, Director for Threat & Vulnerability Management at Thomson Reuters In today's corporations, information security professionals have a lot on their plate. In the face of constantly evolving cyber threats they must comply with numerous laws and regulations, protect their company's assets and mitigate risks to the furthest extent possible.Security professionals can often be ignorant of the impact that implementing security policies in a vacuum can have on the end users' core business activities. These end users are, in turn, often unaware of the risk they are exposing the organisation to. They may even feel justified in finding workarounds because they believe that the organisation values productivity over security. The end result is a conflict between the security team and the rest of the business, and increased, rather than reduced, risk.This can be addressed by factoring in an individual's perspective, knowledge and awareness, and a modern, flexible and adaptable information security approach. The aim of the security practice should be to correct employee misconceptions by understanding their motivations and working with the users rather than against them - after all, people are a company's best assets.Product descriptionBased on insights gained from academic research as well as interviews with UK-based security professionals from various sectors, The Psychology of Information Security - Resolving conflicts between security compliance and human behaviour explains the importance of careful risk management and how to align a security programme with wider business objectives, providing methods and techniques to engage stakeholders and encourage buy-in.The Psychology of Information Security redresses the balance by considering information security from both viewpoints in order to gain insight into security issues relating to human behaviour , helping security professionals understand how a security culture that puts risk into context promotes compliance. About the authorLeron Zinatullin (zinatullin.com) is an experienced risk consultant specialising in cyber security strategy, management and delivery. He has led large-scale, global, high-value security transformation projects with a view to improve cost performance and support business strategy.He has extensive knowledge and practical experience in solving information security, privacy and architectural issues across multiple industry sectors.He has an MSc in information security from University College London, where he focused on the human aspects of information security. His research was related to modelling conflicts between security compliance and human behaviour.Series informationThe Psychology of Information Security is part of the Fundamentals Series, co-published by IT Governance Publishing and Information Security Buzz.Ensure the success of your security programmes by understanding the psychology of information security. Buy this book today.
Considering the pandemic threat in a business continuity context I thoroughly enjoyed reading Clark's book which is written in a style that makes it easy for anyone to understand without requiring a background in medicine or business. I have been involved in disaster management planning for the past ten years and yet I still found this book both enlightening and extremely informative. Dr Tanya Melillo MD, MSc(Dist), PhD This informative book is written in an easy going and conversational manner, but the message it brings to the table is critical to understanding the meaning of any forthcoming pandemic threat and considerations of how to mitigate the effects, where possible, to you and your organisation Owen Gregory MSc BA (Hons) MBCI MBCS The increase in commercial aviation and international travel means that pandemics now spread faster than ever before. Seasonal flu pandemics, zoonotic contagions such as Ebola, swine flu and avian flu (e.g. H5N1 and H7N9), and respiratory syndromes such as SARS and MERS have affected millions worldwide. Add the ever-present threat of terrorism and biological warfare, and the possibility of large proportions of your workforce being incapacitated is a lot stronger than you might think. You may well have prepared for limited business interruptions, but how would your business fare if 50% or more of your employees, including those you rely on to execute your business continuity plan, were afflicted by illness - or worse? Although nothing can be done to prevent pandemics, their impact can be significantly mitigated. Business Continuity and the Pandemic Threat explains how. Product overview The book is divided into two parts, which examine the pandemic threat and explain how businesses can address it: Part I: Understanding the Threat The first, shorter, part provides the reader with a detailed overview of the challenge that pandemic threats can present. It uses historical examples (such as the 1918-19 Spanish Flu outbreak, which killed 50 million) to illustrate how pandemics can have devastating effects not only on the global population but also on critical infrastructure, the global economy and society. Part II: Preparing for the Inevitable The second part of the book considers the actions that can be taken at a global, national, corporate and individual level to mitigate the risk and limit the damage of pandemic incidents. It provides guidance on creating and validating a pandemic plan, and explains how it integrates with a business continuity plan. Comprehensive case studies are provided throughout. Topics covered include: The World Health Organisation (WHO)'s pandemic phases and the Centre for Disease Control (CDC)'s Pandemic Severity Index Preventive control measures Crisis management and the composition of a crisis management team Dealing with cash-flow, staff absenteeism, home working and supply chain management Communications and media plans Pandemic issues for HR The threat to critical national infrastructure Health service contingency plans and first responders' business continuity plans The provision of vaccines and antiviral medicines, including relevant ethical issues Take your business continuity plan to the next level: ensure your organisation survives a pandemic with a substantially depleted workforce. Buy Business Continuity and the Pandemic Threat today. About the author A Fellow of the Institute of Business Continuity Management and Member of the Business Continuity Institute, Robert A. Clark is also a Fellow of the British Computer Society and a Member of the Security Institute. His career includes 15 years with IBM and 11 years with Fujitsu Services working with clients on BCM related assignments. He is now a freelance business continuity consultant at www.bcm-consultancy.com.
Protect your organisation from information security risks For any modern business to thrive, it must assess, control and audit the risks it faces in a manner appropriate to its risk appetite. As information-based risks and threats continue to proliferate, it is essential that they are addressed as an integral component of your enterprise's risk management strategy, not in isolation. They must be identified, documented, assessed and managed, and assigned to risk owners so that they can be mitigated and audited. Fundamentals of Information Risk Management Auditing provides insight and guidance on this practice for those considering a career in information risk management, and an introduction for non-specialists, such as those managing technical specialists. Product overview Fundamentals of Information Risk Management Auditing - An Introduction for Managers and Auditors has four main parts: What is risk and why is it important? An introduction to general risk management and information risk. Introduction to general IS and management risks An overview of general information security controls, and controls over the operation and management of information security, plus risks and controls for the confidentiality, integrity and availability of information. Introduction to application controls An introduction to application controls, the controls built into systems to ensure that they process data accurately and completely. Life as an information risk management specialist/auditor A guide for those considering, or undergoing, a career in information risk management. Each chapter contains an overview of the risks and controls that you may encounter when performing an audit of information risk, together with suggested mitigation approaches based on those risks and controls. Chapter summaries provide an overview of the salient points for easy reference, and case studies illustrate how those points are relevant to businesses. The book concludes with an examination of the skills and qualifications necessary for an information risk management auditor, an overview of typical job responsibilities, and an examination of the professional and ethical standards that an information risk auditor should adhere to. Topics covered Fundamentals of Information Risk Management Auditing covers, among other subjects, the three lines of defence; change management; service management; disaster planning; frameworks and approaches, including Agile, COBIT(R)5, CRAMM, PRINCE2(R), ITIL(R) and PMBOK; international standards, including ISO 31000, ISO 27001, ISO 22301 and ISO 38500; the UK Government's Cyber Essentials scheme; IT security controls; and application controls. About the author Christopher Wright is a qualified accountant, Certified Information Systems Auditor and Certified ScrumMaster(TM) with over 30 years' experience providing financial and IT advisory and risk management services. For 16 years, he worked at KPMG, where he was head of information risk training in the UK and also ran training courses overseas, including in India and throughout mainland Europe. He managed a number of major IS audit and risk assignments, including project risk and business control reviews. He has worked in a wide range of industry sectors including oil and gas, the public sector, aviation, and travel. For the past eight years, he has been an independent consultant specialising in financial, SOX and operational controls for major ERP implementations, mainly at oil and gas/utilities enterprises. He is an international speaker and trainer on Agile audit and governance, and is the author of two other titles, also published by ITGP: Agile Governance and Audit and Reviewing IT in Due Diligence.
Information technology plays a fundamental role in the operations of any modern business. While the confidentiality and integrity of your organisation's information have to be protected, a business still needs to have this information readily available in order to be able to function from day to day. If you are an information security practitioner, you need to be able to sell complex and often technical solutions to boards and management teams. Persuading the board to invest in information security measures requires sales skills. As an information security professional, you are a scientific and technical specialist; and yet you need to get your message across to people whose primary interests lie elsewhere, in turnover and overall performance. In other words, you need to develop sales and marketing skills. This pocket guide will help you with the essential sales skills that persuade company directors to commit money and resources to your information security initiatives. How this book can help information security professionals: Understand basic sales techniques Find out what to do to capture the attention of management and win them over Understand how to present yourself Present yourself so that management takes you seriously, and ensure your proposal receives a proper hearing. Find out how to earn management's trust This guide shows you how to persuade management that you are the kind of information security professional who is interested in supporting, rather than impeding, business success. Learn how to craft a successful proposal This guide offers you invaluable tips on how to write a proposal that will communicate your ideas effectively to senior executives. Improve your powers of persuasion with the board ... Buy this pocket guide today! About the author Alan Calder is the CEO and founder of IT Governance Ltd. He has written widely on IT governance and information security management. This pocket guide is the first in a suite of products to focus on the important subject of making sure you can convince management of information security's importance. A book, a podcast, and more will follow shortly.
The true power of Agile methodologies is not technology; it is business value generation. Use Agile methodologies to turn your IT solution challenges into high business-value returns All too often, IT solutions are plagued by budget overruns, missed deadlines, low-quality outputs and dissatisfied users. Agile methodologies are proven, common-sense methods for substantially increasing the relevance, flexibility and bottom-line business value of your software solutions. Quantify and measure the benefits that Agile methodologies can deliver to your organisation. Agile methodologies, such as Scrum, DSDM, FDD, Lean, XP and Kanban, are proven approaches for applying the finite resources of an organisation to deliver high business-value software solutions on time and within allocated budgets. These methodologies protect organisations from wasting their IT budgets by replacing large upfront financial commitments with incremental investment based on the ongoing business value of delivered software. They encourage collaboration with key stakeholders, empower staff to regularly deliver bottom-line value, and ensure that IT solutions are responsive to ongoing organisational and market changes. Read this guide and ... Understand the 10 core business benefits of Agile. At the heart of Agile methodologies are 10 core business benefits that enable organisations to maximise their IT investments, including: Better risk management, ongoing control of budget expenditure, better alignment with business requirements, and substantially higher quality IT solutions. Agile: An Executive Guide details each of these benefits from a strategic senior management perspective. Identify which Agile methodologies align with the specific needs of your organisation. Agile: An Executive Guide provides you with tools to assess your organisational culture, structure and dynamic in order to determine whether Agile methodologies are suitable to your specific needs, and to select those Agile methodologies that are the best fit for your organisation. Get the essential information you need to implement Agile within your organisation. Agile: An Executive Guide is full of practical advice, including detailed guidelines to help you: Choose the right kick-off point for Agile within your organisation; avoid common traps; monitor and measure your investment; and broaden the use of Agile methodologies into other areas of your organisation. It includes step-by-step guidelines, interactive tools and targeted questionnaires to help you and your staff successfully implement these methodologies. Agile: An Executive Guide describes Agile methodologies in clear business language specifically written for business professionals. It will help you make realistic business-driven decisions on whether Agile methodologies are appropriate for your organisation; whether you are looking to consolidate your IT overheads, to provide better software solutions to your clients, or to have more control over your IT expenditures. This guide provides practical, proven ways to introduce, incorporate and leverage Agile methodologies to maximise your business returns.
75% of companies without a business continuity plan fail within three years. Disruptive incidents can affect any organisation and occur at any moment. ICT outages, cyber attacks, natural disasters, terrorist attacks, pandemics, supply chain failures and other unexpected events can all affect productivity and in many cases place a company's survival in serious jeopardy. Business continuity planning is essential to overcoming business disruptions, but too many companies prepare business continuity plans and then shelve them, only for those plans to fail when they're actually needed. 80% of companies that have not recovered from a disaster within one month go out of business. A business continuity plan that isn't validated isn't a plan at all - it's merely a strategy. Indeed, in some cases an untested plan is worse than no plan at all. In spite of this, only 30% of businesses actually validate their business continuity plans. Product overview Business continuity planning is a process of continual improvement, not a matter of writing a plan and then putting your feet up. Attempting to validate every aspect of your plan, however - particularly in a live rehearsal situation - could create a disaster of your own making.Validating Your Business Continuity Plan examines the three essential components of validating a business continuity plan - exercising, maintenance and review - and outlines a controlled and systematic approach to BCP validation while considering each component, covering methods and techniques such as table-top reviews, workshops and live rehearsals. The book also takes account of industry standards and guidelines to help steer the reader through the validation process, including the international standard ISO 22301 and the Business Continuity Institute's Good Practice Guidelines. In addition, it provides a number of case studies based on the author's considerable experience - some of them successful, others less so - to highlight common pitfalls and problems associated with the validation process. Contents Introduction Standards and guidelines Business continuity begins at home Defining your exercise programme Selected scenarios Live rehearsal case studies It could happen to anyone, couldn't it? Maintaining your BCMS Reviewing your BCMS Performance appraisal Using consultants to help you exercise Training and education Additional reference material About the author Robert A Clark is a fellow of the Institute of Business Continuity Management, a fellow of the British Computer Society, a member of the Business Continuity Institute and an Approved BCI Instructor. He was employed by IBM for 15 years and Fujitsu for 11, working with clients on BCM-related assignments. He is now a freelance business continuity consultant at www.bcm-consultancy.com. Since 2014, he has been a part-time associate lecturer at Manchester Metropolitan University, where he has delivered BCM courses to both undergraduate and postgraduate students. Move your employees' BCP awareness from 'unconscious incompetence' to 'unconscious competence'. Order Validating Your Business Continuity Plan today.
A comprehensive reference guide to IT project assessments, from planning to presentation Companies invest billions in technology projects each year, yet their success rates remain surprisingly low. Industry benchmarks suggest that only 15-20% of projects are completed on time and on budget. Project failures can impair an organization's capability as well as having significant commercial, compliance, and security ramifications, which in turn could cause reputational damage and long-term financial losses. It is therefore critical that projects meet their objectives. One way of ensuring that they do is to conduct assessments or audits at key points during their lifecycle. Product overview Assessing IT Projects to Ensure Successful Outcomes is a comprehensive reference guide that focuses on the assessment of IT projects. Organised into five main sections (Approach, Plan, Collect Information, Assess and Recommend, Package and Present), interspersed with case studies based on the author's extensive experience delivering projects, the book provides exhaustive guidance on structuring and conducting an IT project assessment, from planning to presentation. Assessing IT Projects to Ensure Successful Outcomes includes guidance on: Types of assessments and project approaches, including the difference between a project and program assessment. Determining a suitable assessment approach, developing a plan, preparing inventories, and planning for logistics. Information collection and assessment, including identifying and addressing challenges and gaps. Project scoping, change management, schedule management, and cost management. Key roles and focus areas, including team responsibilities and necessary documents, for each project stage. Communication strategies to ensure all stakeholders are kept appropriately informed of a project's progress. RAID (risks, actions, issues, decisions) management to address risks and issues that arise, actions that must be performed, and decisions that need to be made throughout the project's lifecycle. Compliance with standard frameworks. Intangibles, such as adapting to company cultures and reacting to cultural conflicts, resource and team dynamics, perception and reputations, and morale. How to package and present an assessment's findings and recommendations in a suitable manner. It also features a detailed summary section containing checklists for assessing all stages of projects - including typical roles on a project team, details of interview responsibilities by role, and a list of necessary project documents. This information can be used either reactively as an easy reference to assess projects, or proactively as a checklist of the considerations and activities required to plan and manage a project. Although principally aimed at professionals who are assessing projects - such as internal auditors, framework auditors, project assessors, or external consultants - Assessing IT Projects to Ensure Successful Outcomes can also be used by project managers looking for a comprehensive view of approaches for managing projects, or as a means of preparing for an assessment of their project. About the author Kerry Wills is a consultant and a project manager who has worked on multi-million dollar technology projects for Fortune 500 companies since 1995, gaining essential experience as program manager, project manager, architect, developer, business analyst, and tester. This breadth of experience gives him a deep understanding of all facets of IT projects. He has planned and executed several large programs, as well as assessed and remediated several troubled programs . Kerry Wills is also the author of Essential Project Management Skills and Applying Guiding Principles of Effective Program Delivery.
The Internet has become the defining medium for information exchange in the modern world, and the unprecedented success of new web publishing platforms such as those associated with social media has confirmed its dominance as the main information exchange platform for the foreseeable future. But how do you conduct an online investigation when so much of the Internet isn't even indexed by search engines? Accessing and using the information that's freely available online is about more than just relying on the first page of Google results. Open source intelligence (OSINT) is intelligence gathered from publically available sources and is the key to unlocking this domain for the purposes of investigation. Product overview The Tao of Open Source Intelligence provides a comprehensive guide to OSINT techniques, for the investigator: It catalogues and explains the tools and investigative approaches that are required when conducting research within the surface, deep and dark webs. It explains how to scrutinise criminal activity without compromising your anonymity - and your investigation. It examines the relevance of cyber geography and how to get around its limitations. It describes useful add-ons for common search engines, as well as considering metasearch engines (including Dogpile, Zuula, PolyMeta, iSeek, Cluuz and Carrot2) that collate search data from single-source intelligence platforms such as Google. It considers deep-web social media platforms and platform-specific search tools, detailing such concepts as concept mapping, entity extraction tools and specialist search syntax (Google kung fu). It gives comprehensive guidance on Internet security for the smart investigator, and how to strike a balance between security, ease of use and functionality, giving tips on counterintelligence, safe practices and debunking myths about online privacy. OSINT is a rapidly evolving approach to intelligence collection, and its wide application makes it a useful methodology for numerous practices, including within the criminal investigation community. The Tao of Open Source Intelligence is your guide to the cutting edge of this information collection capability. About the author Stewart K. Bertram is a career intelligence analyst who has spent over a decade working across the fields of counterterrorism, cyber security, corporate investigations and geopolitical analysis. The holder of a master's degree in computing and a master of letters in terrorism studies, Stewart is uniquely placed at the cutting edge of intelligence and investigation, where technology and established tradecraft combine. Stewart fuses his academic knowledge with significant professional experience, having used open source intelligence on such diverse real-world topics as the terrorist use of social media in Sub-Saharan Africa and threat assessment at the London Olympic Games. Stewart teaches courses on open source intelligence as well as practising what he preaches in his role as a cyber threat intelligence manager for some of the world's leading private-sector intelligence and security agencies.
Passwords are not enough A password is a single authentication factor - anyone who has it can use it. No matter how strong it is, if it's lost or stolen, it's entirely useless at keeping information private. To secure your data properly, you also need to use a separate, secondary authentication factor. Data breaches are now commonplace In recent years, large-scale data breaches have increased dramatically in both severity and number, and the loss of personal information - including password data - has become commonplace. Furthermore, the fact that rapidly evolving password-cracking technology and the habitual use - and reuse - of weak passwords has rendered the security of username and password combinations negligible, and you have a very strong argument for more robust identity authentication. Consumers are beginning to realise just how exposed their personal and financial information is, and are demanding better security from the organisations that collect, process and store it. This has led to a rise in the adoption of two-factor authentication (TFA or 2FA). In the field of authentication security, the method of proving identity can be broken down into three characteristics - roughly summarised as 'what you have', 'what you are' and 'what you know'. Two-factor authentication relies on the combination of two of these factors. Product overview TFA is nothing new. It's mandated by requirement 8.3 of the Payment Card Industry Data Security Standard (PCI DSS) and banks have been using it for years, combining payment cards ('what you have') and PINs ('what you know'). If you use online banking you'll probably also have a chip authentication programme (CAP) keypad, which generates a one-time password (OTP). What is new is TFA's rising adoption beyond the financial sector. Two-Factor Authentication provides a comprehensive evaluation of popular secondary authentication methods, such as: Hardware-based OTP generation SMS-based OTP delivery Phone call-based mechanisms Geolocation-aware authentication Push notification-based authentication Biometric authentication factors Smart card verification As well as examining MFA (multi-factor authentication), 2SV (two-step verification) and strong authentication (authentication that goes beyond passwords, using security questions or layered security), the book also discusses the wider application of TFA for the average consumer, for example at such organisations as Google, Amazon and Facebook. It also considers the future of multi-factor authentication, including its application to the Internet of Things (IoT). Increasing your password strength will do absolutely nothing to protect you from online hacking, phishing attacks or corporate data breaches. If you're concerned about the security of your personal and financial data, you need to read this book. About the author Mark Stanislav is an information technology professional with over a decade's varied experience in systems administration, web application development and information security. He is currently a senior security consultant for the Strategic Services team at Rapid7. Mark has spoken internationally at nearly 100 events, including RSA, DEF CON, SecTor, SOURCE Boston, ShmooCon and THOTCON. News outlets such as the Wall Street Journal, Al Jazeera America, Fox Business, MarketWatch, CNN Money, Yahoo Finance, Marketplace and The Register have featured Mark's research, initiatives and insights on information security.
Protect your organisation by building a security-minded culture "With this book, Kai Roer has taken his many years of cyber experience and provided those with a vested interest in cyber security a firm basis on which to build an effective cyber security training programme." Dr. Jane LeClair Chief Operating Officer National Cybersecurity Institute, Washington, D.C. Human nature - easy prey for hackers? Human behaviour is complex and inconsistent, making it a rich hunting ground for would-be hackers and a significant risk to the security of your organisation . An effective way to address this risk is to create a culture of security. Using the psychology of group behaviour and explaining how and why people follow social and cultural norms, the author highlights the underlying cause for many successful and easily preventable attacks. An effective framework for behavioural security In this book Kai Roer presents his Security Culture Framework, and addresses the human and cultural factors in organisational security. The author uses clear, everyday examples and analogies to reveal social and cultural triggers that drive human behaviour . He explains how to manage these threats by implementing an effective framework for an organisational culture, ensuring that your organisation is set up to repel malicious intrusions and threats based on common human vulnerabilities. Contents What is security culture? The Elements of security culture How does security culture relate to security awareness? Asking for help raises your chances of success The psychology of groups and how to use it to your benefit Measuring culture Building security culture About the author Kai Roer is a management and security consultant and trainer with extensive international experience from more than 30 countries around the world. He is a guest lecturer at several universities, and the founder of The Roer Group, a European management consulting group focusing on security culture. Kai has authored a number of books on leadership and cyber security , has been published extensively in print and online, has appeared on radio and television, and has featured in printed media. He is a columnist at Help Net Security and has been the Cloud Security Alliance Norway chapter president since 2012. Kai is a passionate public speaker who engages his audience with his entertaining style and deep knowledge of human behaviours , psychology and cyber security . He is a Fellow of the National Cybersecurity Institute and runs a blog on information security and culture (roer.com). Kai is the host of Security Culture TV, a monthly video and podcast. Series information Build a Security Culture is part of the Fundamentals Series, co-published by IT Governance Publishing and Information Security Buzz.
An expert introductionMore than 85% of businesses now take advantage of Cloud computing, but Cloud computing does not sit easily with the DPA. Data Protection and the Cloud addresses that issue, providing an expert introduction to the legal and practical data protection risks involved in using Cloud services. Data Protection and the Cloud highlights the risks an organisation's use of the Cloud might generate, and offers the kind of remedial measures that might be taken to mitigate those risks.Topics covered include:Protecting the confidentiality, integrity and accessibility of personal dataData protection responsibilitiesThe data controller/data processor relationshipHow to choose Cloud providersCloud security - including two-factor authentication, data classification and segmentationThe increased vulnerability of data in transitThe problem of BYOD (bring your own device)Data transfer abroad, US Safe Harbor and EU legislationRelevant legislation, frameworks and guidance, including:the EU General Data Protection RegulationCloud computing standardsthe international information security standard, ISO 27001the UK Government's Cyber Essentials scheme and security frameworkCESG's Cloud security management principlesguidance from the Information Commissioner's Office and the Open Web Application Security Project (OWASP)Mitigate the security risksMitigating security risks requires a range of combined measures to be used to provide end-to-end security. Moving to the Cloud does not solve security problems, it just adds another element that must be addressed. Data Protection and the Cloud provides information on how to do so while meeting the DPA's eight principles.
Are your internal audits adding value? Organizations hoping to comply with any of the International Standards for management systems (e.g. ISO9001, ISO27001) must carry out internal audits. However, the requirements set down by accreditation bodies for auditor courses make little distinction between internal and external audit programs. As a result, many organizations instruct their internal auditors using resources designed for external auditors. Such internal audit programs often fail to develop beyond simple compliance monitoring, and risk becoming 'box-ticking' exercises, adding little value to the organization. This book provides a model for the management and implementation of internal audits that moves beyond simple compliance to ISO requirements and turns the internal audit into a transformational tool that the organization can use to assist with the management of risk, and implement improvements to management systems. It shows you how you can transform your internal auditing process to become a tool for development and continual improvement in your management systems. Buy this book and start adding value to your internal auditing program.
Many auditors are now encountering Agile management methodologies for the first time. In some cases, this can cause problems for the audit process because the methodology is very different from traditional approaches. Aside from the difficulties faced by the auditor, an ineffective audit can have a negative effect on an Agile project by giving a false impression of its progress. It might even harm the final project outcome. Written for auditors and Agile managers, Agile Governance and Audit bridges the gap between traditional auditing approaches and the requirements of Agile methodologies. It provides an overview of Agile for auditors and other risk professionals who have not encountered the approach before. The book also tells Agile teams what auditors and risk professionals need, and the sort of questions they are likely to ask. Each chapter includes hints and tips for auditors, and a selection of case studies is included to illustrate the practical issues involved in auditing Agile projects. This makes it an ideal book for any auditor encountering the Agile methodology, and any Agile teams preparing for a management audit. This book will enable you to understand how to get the most out of Agile audits, whatever your role.
In this new edition of her award-winning book, Jamie Lynn Cooke explains the principles of Agile, shows why it works, and demonstrates how to use Agile to significantly increase productivity, quality, and customer satisfaction in any industry. It shows how Agile approaches can give you a faster, more flexible and highly responsive framework, allowing your organisation to leverage internal and external changes more quickly; significantly more efficient use of resources and time, freeing up staff for greater innovation and value creation; direct stakeholder engagement, resulting in better customer relationships and more compelling product development. Written for managers and business professionals, the book presents a range of proven Agile methods including Scrum, Kanban, Feature Driven Development and the Dynamic Systems Development Method in clear business language. The author then devotes a chapter to each of the 12 Agile principles that make these approaches consistently successful, and details how to use these methods to tackle the core challenges faced by every organization. The book concludes with in-depth case study that compares Agile with traditional approaches for achieving three common business objectives, followed by step-by-step guidelines to making Agile work for your organization, and a range of resources for further reading. Read this book and learn how to unleash the potential of Agile in your organization.
Cloud functionality increases flexibility and capacity in IT systems, but it also adds complexity and requires a combination of business, financial and technical expertise to make it work effectively. Moreover, organizations often confuse availability with capacity, and assume incorrectly that using cloud services reduces the need to manage these factors. In Availability and Capacity Management in the Cloud: An ITSM narrative, Daniel McLean's fictional IT service management practitioner, Chris, faces the challenge of integrating cloud services into an ITSM structure. Based on the real-life experience of the author and other ITSM practitioners, this book tells the story of a cloud services implementation, exposing potential pitfalls and exploring how to handle issues that come with such projects. The end-of-chapter pointers give useful advice on dealing with the challenges organizations face when considering cloud services. Read this book and see how Chris meets the challenge of integrating cloud services with ITSM, and how you can do the same. Learn from the successes. Avoid the mistakes.
Accessible and professional advice on how to implement an ISO14001 environmental management system In the 21st century, business has to take sustainability seriously. As public opinion becomes increasingly concerned about climate change, governments are imposing ever tighter environmental regulations on both industry and the retail sector. By putting in place an environmental management system (EMS), you can ensure you are disposing of your waste in a responsible manner and making the most efficient use of raw materials. This will help you to lower carbon emissions and keep the negative impact of your business on the environment to a minimum. ISO14001 The International Standard The international standard for an EMS is ISO14001. With an EMS certified to ISO14001, you can improve the safety and efficiency of your business operations, and, at the same time, boost customer confidence and reassure your stakeholders. An invaluable step-by-step guide This pocket guide, intended to help you put in place an EMS, is specifically focused on ISO14001. It is designed to enable industry managers, who may be lacking in specialist knowledge, to achieve compliance with the Standard. A step-by-step approach makes the guide easy to follow. The authors, two experienced auditors, are acknowledged experts on environmental management systems, and they have drawn on material from the UK's Environment Agency. The pocket guide will prove invaluable, not only for auditors and trainers, but also for managers across many sectors of industry. Read this guide and learn how to ...*Achieve compliance with ISO14001 Instead of just telling you, in bureaucratic fashion, what is specified under ISO14001, this user-friendly guide looks at the active steps you can take in order to ensure compliance with the Standard. It discusses the factors you need to consider when defining the objectives of the EMS, such as financial viability and available technology, and offers suggestions for measuring and monitoring the effectiveness of your environmental policy. *Manage environmental risks The Deepwater Horizon oil spill is an example of the financial and reputational risks associated with environmental pollution. This pocket guide contains sound advice on the types of operational controls you need to put in place to manage environmental risks and help avoid incidents. *Prepare to deal with an emergency The pocket guide offers suggestions on how to plan for an emergency, such as a spillage or a gas leak, ensuring you have procedures in place to minimise the environmental impact. *Improve the image of your brand Ultimately, organisations aim to operate in a way that shows respect for the environment. Certification to ISO14001 is a recognised measure of that commitment. It is in the interests of your business to be well regarded by the public and, if you use this guide to help secure compliance with ISO14001, you can improve public perception of your organisation. Investing in ISO14001 certification can contribute to enhanced brand equity. Take your organisation step by step towards successful ISO14001 certification! Order this pocket guide today!
This pocket guide provides you with an insider s detailed description of Accenture s IT governance policy and details its governance structure. It will show how effective IT governance links IT strategy and IT decisions to Accenture s business strategy and business priorities. Following the best practices approach set out in this pocket guide will serve as an excellent starting point for any organisation with ambitions to achieve high performance. Benefits to business include: * Boost productivity How hard do you work in other areas of your business to cut costs and improve efficiency? In testing economic times, is the absence of a clear strategy for your business s IT governance still a realistic option? Learning from Accenture s proven approach will enable you to increase your organisation s competitiveness over the longer term. * Coordinate your operations To ensure effective decision-making and align your IT function with your broader business goals, you need to make the structure of your IT governance fit your overall corporate governance structure. That way, you can make your IT work for your business. * Manage change effectively IT is crucial for realising the changes you want your business to make. For this reason, you cannot afford to have these changes treated merely as IT projects that have been foisted on the company by the IT department. By bringing top management on board, and giving business leaders a formal role in the IT governance of your organisation, you will make the success of any project with an IT component much more likely. * Keep a grip on budgets The costs of IT projects are notoriously prone to overrun, while some IT development programmes have promised more than they ever delivered. The Accenture way of doing business is different. Following the Accenture approach means ensuring that your IT investment is backed by a solid business case, and measuring the return on investment following project completion. High performance Chief executives now put high performance IT among their top strategic objectives. So, if you are looking to improve IT governance in your own organisation, finding out what Robert E. Kress has to say is as good a starting point as any. This book will show you his company s best practice approach to the subject. Whatever business you are in, there is nearly always a clear link between the performance of your IT function and your company s overall results. The bottom line Robert E. Kress, the writer of this pocket guide, is someone who gets things done. As Executive Director of Business Operations for Accenture s IT organisation, he manages a $700 million IT operation for a company with employees in 52 countries. IT is critical to Accenture s success as a management consultancy and technology services provider. IT governance matters to the bottom line, so Accenture insists on clear accountability for IT decisions and delivery. The capacity of Accenture s IT function to stay focussed on the needs of the business is one reason why Accenture has succeeded in doubling its revenue and racking up profits. Between 2001 and 2009, Accenture s operating profits nearly trebled to reach $2.6 billion.
ITIL 4 is the latest evolution of the leading best-practice framework for ITSM (IT service management). It has been significantly updated from ITIL v3 and addresses new ITSM challenges, includes new technologies and incorporates new ways of working. ITIL Foundation Essentials - ITIL 4 Edition* is the ultimate revision guide for candidates preparing for the ITIL 4 Foundation exam. It is fully aligned with the Foundation course syllabus and gives a clear and concise overview of the facts. You can use it in place of writing revision notes, giving you more time to focus on learning the information you need to pass the exam. Whether you are taking an ITIL 4 Foundation training course or are a self-study candidate, new to the framework or looking to upgrade your ITIL 2011 certification, this guide is the essential companion. It: -Provides definitions of the key terms and concepts used in ITIL 4; -Presents detailed information in clear, user-friendly and easy-to-follow ways through tables, bullet points and diagrams; and -Explains the key figures and diagrams in the ITIL syllabus. New for the ITIL 4 Edition: -Fully updated to reflect the changes introduced in ITIL 4. -New sections on the guiding principles of ITIL and the four dimensions of service management. -Updated overview of the ITIL Foundation exam.
The EU General Data Protection Regulation (GDPR) will supersede the 1995 EU Data Protection Directive (DPD) and all EU member states' national laws based on it - including the UK Data Protection Act 1998 - in May 2018. All organizations - wherever they are in the world - that process the personally identifiable information (PII) of EU residents must comply with the Regulation. Failure to do so could cost them up to 20 million, or 4% of annual global turnover in fines. US organizations that process EU residents' PII can comply with the GDPR via the EU-US Privacy Shield, which replaced the EU-US Safe Harbor framework in 2016. The Privacy Shield is based on the DPD, and will likely be updated once the GDPR is applied in May 2018. This book provides a detailed commentary on the GDPR, explains the changes you need to make to your data protection and information security regimes, and tells you exactly what you need to do to avoid severe financial penalties. Product overview EU GDPR - An Implementation and Compliance Guide is a clear and comprehensive guide to this new data protection law, explaining the Regulation, and setting out the obligations of data processors and controllers in terms you can understand. Topics covered include: *The role of the data protection officer (DPO) - including whether you need one and what they should do. *Risk management and data protection impact assessments (DPIAs), including how, when and why to conduct a DPIA. *Data subjects' rights, including consent and the withdrawal of consent; subject access requests and how to handle them; and data controllers' and processors' obligations. *International data transfers to "third countries" - including guidance on adequacy decisions and appropriate safeguards; the EU-US Privacy Shield; international organizations; limited transfers; and Cloud providers. *How to adjust your data protection processes to transition to GDPR compliance, and the best way of demonstrating that compliance. *A full index of the Regulation to help you find the recitals and articles relevant to your organization. * The GDPR will have a significant impact on organizations' data protection regimes around the world. EU GDPR - An Implementation and Compliance Manual shows you exactly what you need to do to comply with the new law. About the authors |
You may like...
Atlas - The Story Of Pa Salt
Lucinda Riley, Harry Whittaker
Paperback
|