๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Data Breach Preparation and Response. Breaches Are Certain, Impact Is Not

โœ Scribed by Kevvie Fowler


Publisher
Syngress
Year
2016
Tongue
English
Leaves
245
Edition
1
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Data Breach Preparation and Response: Breaches are Certain, Impact is Not is the first book to provide 360 degree visibility and guidance on how to proactively prepare for and manage a data breach and limit impact. Data breaches are inevitable incidents that can disrupt business operations and carry severe reputational and financial impact, making them one of the largest risks facing organizations today. The effects of a breach can be felt across multiple departments within an organization, who will each play a role in effectively managing the breach. Kevvie Fowler has assembled a team of leading forensics, security, privacy, legal, public relations and cyber insurance experts to create the definitive breach management reference for the whole organization.

  • Discusses the cyber criminals behind data breaches and the underground dark web forums they use to trade and sell stolen data
  • Features never-before published techniques to qualify and discount a suspected breach or to verify and precisely scope a confirmed breach
  • Helps identify your sensitive data, and the commonly overlooked data sets that, if stolen, can result in a material breach
  • Defines breach response plan requirements and describes how to develop a plan tailored for effectiveness within your organization
  • Explains strategies for proactively self-detecting a breach and simplifying a response
  • Covers critical first-responder steps and breach management practices, including containing a breach and getting the scope right, the first time
  • Shows how to leverage threat intelligence to improve breach response and management effectiveness
  • Offers guidance on how to manage internal and external breach communications, restore trust, and resume business operations after a breach, including the critical steps after the breach to reduce breach-related litigation and regulatory fines
  • Illustrates how to define your cyber-defensible position to improve data protection and demonstrate proper due diligence practices

โœฆ Table of Contents


Content:
Front Matter,Copyright,About the Author,About the Contributors,AcknowledgmentsEntitled to full textChapter 1 - An Overview of Data Breaches, Pages 1-26
Chapter 2 - Preparing to Develop a Computer Security Incident Response Plan, Pages 27-48
Chapter 3 - Developing a Computer Security Incident Response Plan, Pages 49-77
Chapter 4 - Qualifying and Investigating a Breach, Pages 79-108
Chapter 5 - Containing a Breach, Pages 109-124
Chapter 6 - Precisely Determining the Scope of a Breach, Pages 125-166
Chapter 7 - Communicating Before, During and After a Breach, Pages 167-185
Chapter 8 - Restoring Trust and Business Services After a Breach, Pages 187-215
Chapter 9 - Preparing for Breach Litigation, Pages 217-230
Appendix, Pages 231-236
Index, Pages 237-240

โœฆ Subjects


COMPUTERS;Security;Networking;Computer networks;Security measures;Computer security


๐Ÿ“œ SIMILAR VOLUMES


Oracle Incident Response and Forensics:
โœ Pete Finnigan (auth.) ๐Ÿ“‚ Library ๐Ÿ“… 2018 ๐Ÿ› Apress ๐ŸŒ English

<p>Take the right steps when a breach of your Oracle Database environment becomes known or suspected. You will learn techniques for discerning how an attacker got in, what data they saw, and what else they might have done. <br/>This book helps you understand forensics in relation to Oracle Database,

Oracle Incident Response and Forensics P
โœ Finnigan, Pete ๐Ÿ“‚ Library ๐Ÿ“… 2018;2017 ๐Ÿ› Apress ๐ŸŒ English

Rรฉsumรฉ : Discussing forensics in relation to Oracle Database, this book provides the tools and techniques needed to investigate a breach, and the measures to put in place to make it harder for an attack to be successful in the future. --