Get Free Shipping on orders over $79
Cybersecurity and Privacy Law Handbook : A beginner's guide to dealing with privacy and security while keeping hackers at bay - Walter Rocchi

Cybersecurity and Privacy Law Handbook

A beginner's guide to dealing with privacy and security while keeping hackers at bay

By: Walter Rocchi

eText | 16 December 2022 | Edition Number 1

At a Glance

eText


$61.59

or 4 interest-free payments of $15.40 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

Get to grips with cybersecurity and privacy laws to protect your company's data and learn how to comply with international privacy standards

Key Features

  • Comply with cybersecurity standards and protect your data from hackers
  • Identify the gaps in your company's security posture using gap analysis and business impact analysis
  • Understand what you need to do with security and privacy without needing to pay consultants

Book Description

Cybercriminals are always thinking up new ways to compromise people's online systems and wreak havoc. This creates an ever-growing need for cybersecurity practitioners in every organization across the globe and international security standards, such as the ISO27k family of standards, to try and prevent cybercrime.

If you're looking to ensure that your company's data conforms to these standards, Cybersecurity and Privacy Law Handbook has got you covered. It'll not only instill you with the rudiments of cybersecurity, but will also guide you through privacy laws and explain how you can ensure that you comply with them to prevent cybersecurity incidents and avoid the hefty fines that non-compliance with standards can lead to.

Assuming that you're new to the field, the book starts by introducing cybersecurity frameworks and concepts discussed throughout the chapters. You'll learn why privacy is important and how to find the security gaps in your company's systems. There's a practical element to the book as well—you'll prepare policies and procedures to prevent your company from being breached. The book ends by helping you explore cloud security and the complex nature of privacy laws in the US.

By the end of this book, you'll be well placed to protect your company's data and comply with the relevant standards.

What you will learn

  • Analyze your security posture with gap analysis and risk management
  • Help spread a cybersecurity posture throughout your organization
  • Use both ISO27001 and NIST to make a better security framework
  • Explore privacy laws such as GDPR, PCI CSS, HIPAA, and FTC
  • Discover how to implement training to raise cybersecurity awareness
  • Find out how to comply with cloud privacy regulations
  • Examine the complex privacy laws in the US
  • Comply with cybersecurity requirements without needing an attorney

Who This Book Is For

If you're a seasoned IT security and/or cybersecurity pro, this book isn't for you. This book is for novices, freshers, students, experts in other fields, and managers who are willing to learn the workings and management of a security function. Although this book will teach you how to build and manage a security function on your own, you'll also find it valuable if you want to supervise a team devoted to implementing cybersecurity and privacy practices in an organization.

Table of Contents

  1. The ISO27K Family-Definitions and Security Concepts
  2. ISO27001 Mandatory Requirements - Context, Scope, and Leadership
  3. Data Protection
  4. Data Processing
  5. Security Planning and Risk Management
  6. ISO27001 Mandatory Requirements
  7. Controls, Training, and Awareness
  8. How to Prepare Foolproof Policies and Procedures to Avoid Internal Risks
  9. Privacy Compliance for Your Data in the Cloud
  10. What About the US
  11. Name TBD
on
Desktop
Tablet
Mobile

More in Network Security

Network Security : A Systems Approach - Larry L Peterson

eBOOK

Cyberethics 8E - Richard A. Spinello

eTEXT

$83.67