Cover for Data Breach Preparation and Response

Data Breach Preparation and Response

Breaches Are Certain, Impact Is Not

Book2016

Authors:

Kevvie Fowler

Data Breach Preparation and Response

Breaches Are Certain, Impact Is Not

Book2016

 

Cover for Data Breach Preparation and Response

Authors:

Kevvie Fowler

Browse this book

Book description

Data Breach Preparation and Response: Breaches are Certain, Impact is Not is the first book to provide 360 degree visibility and guidance on how to proactively prepare for and man ... read full description

Browse content

Table of contents

Actions for selected chapters

Select all / Deselect all

  1. Full text access
  2. Book chapterAbstract only

    Chapter 1 - An Overview of Data Breaches

    Pages 1-26

  3. Book chapterAbstract only

    Chapter 2 - Preparing to Develop a Computer Security Incident Response Plan

    Pages 27-48

  4. Book chapterAbstract only

    Chapter 3 - Developing a Computer Security Incident Response Plan

    Pages 49-77

  5. Book chapterAbstract only

    Chapter 4 - Qualifying and Investigating a Breach

    Pages 79-108

  6. Book chapterAbstract only

    Chapter 5 - Containing a Breach

    Pages 109-124

  7. Book chapterAbstract only

    Chapter 6 - Precisely Determining the Scope of a Breach

    Pages 125-166

  8. Book chapterAbstract only

    Chapter 7 - Communicating Before, During and After a Breach

    Pages 167-185

  9. Book chapterAbstract only

    Chapter 8 - Restoring Trust and Business Services After a Breach

    Pages 187-215

  10. Book chapterAbstract only

    Chapter 9 - Preparing for Breach Litigation

    Pages 217-230

  11. Book chapterNo access

    Appendix

    Pages 231-236

  12. Book chapterNo access

    Index

    Pages 237-240

About the book

Description

Data Breach Preparation and Response: Breaches are Certain, Impact is Not is the first book to provide 360 degree visibility and guidance on how to proactively prepare for and manage a data breach and limit impact. Data breaches are inevitable incidents that can disrupt business operations and carry severe reputational and financial impact, making them one of the largest risks facing organizations today. The effects of a breach can be felt across multiple departments within an organization, who will each play a role in effectively managing the breach. Kevvie Fowler has assembled a team of leading forensics, security, privacy, legal, public relations and cyber insurance experts to create the definitive breach management reference for the whole organization.

Data Breach Preparation and Response: Breaches are Certain, Impact is Not is the first book to provide 360 degree visibility and guidance on how to proactively prepare for and manage a data breach and limit impact. Data breaches are inevitable incidents that can disrupt business operations and carry severe reputational and financial impact, making them one of the largest risks facing organizations today. The effects of a breach can be felt across multiple departments within an organization, who will each play a role in effectively managing the breach. Kevvie Fowler has assembled a team of leading forensics, security, privacy, legal, public relations and cyber insurance experts to create the definitive breach management reference for the whole organization.

Key Features

  • Discusses the cyber criminals behind data breaches and the underground dark web forums they use to trade and sell stolen data
  • Features never-before published techniques to qualify and discount a suspected breach or to verify and precisely scope a confirmed breach
  • Helps identify your sensitive data, and the commonly overlooked data sets that, if stolen, can result in a material breach
  • Defines breach response plan requirements and describes how to develop a plan tailored for effectiveness within your organization
  • Explains strategies for proactively self-detecting a breach and simplifying a response
  • Covers critical first-responder steps and breach management practices, including containing a breach and getting the scope right, the first time
  • Shows how to leverage threat intelligence to improve breach response and management effectiveness
  • Offers guidance on how to manage internal and external breach communications, restore trust, and resume business operations after a breach, including the critical steps after the breach to reduce breach-related litigation and regulatory fines
  • Illustrates how to define your cyber-defensible position to improve data protection and demonstrate proper due diligence practices
  • Discusses the cyber criminals behind data breaches and the underground dark web forums they use to trade and sell stolen data
  • Features never-before published techniques to qualify and discount a suspected breach or to verify and precisely scope a confirmed breach
  • Helps identify your sensitive data, and the commonly overlooked data sets that, if stolen, can result in a material breach
  • Defines breach response plan requirements and describes how to develop a plan tailored for effectiveness within your organization
  • Explains strategies for proactively self-detecting a breach and simplifying a response
  • Covers critical first-responder steps and breach management practices, including containing a breach and getting the scope right, the first time
  • Shows how to leverage threat intelligence to improve breach response and management effectiveness
  • Offers guidance on how to manage internal and external breach communications, restore trust, and resume business operations after a breach, including the critical steps after the breach to reduce breach-related litigation and regulatory fines
  • Illustrates how to define your cyber-defensible position to improve data protection and demonstrate proper due diligence practices

Details

ISBN

978-0-12-803451-4

Language

English

Published

2016

Copyright

Copyright © 2016 Elsevier Inc. All rights reserved.

Imprint

Syngress

You currently don’t have access to this book, however you can purchase separate chapters directly from the table of contents or buy the full version.

Purchase the book

Authors

Kevvie Fowler