Data Breaches: Crisis and Opportunity
Authors: Sherri Davidoff
ISBN-10: 0134506782
ISBN-13: 9780134506784
Edition 版本: 1
Released: 2019-10-26
Print Length 页数: 464 pages
Book Description
Protect Your Organization Against Massive Data Breaches and Their Consequences
Data breaches can be catastrophic,but they remain mysterious because victims don’t want to talk about them. In Data Breaches,world-renowned cybersecurity expert Sherri Davidoff shines a light on these events,offering practical guidance for reducing risk and mitigating consequences. Reflecting extensive personal experience and lessons from the world’s most damaging breaches,Davidoff identifies proven tactics for reducing damage caused by breaches and avoiding common mistakes that cause them to spiral out of control.
You’ll learn how to manage data breaches as the true crises they are; minimize reputational damage and legal exposure; address unique challenges associated with health and payment card data; respond to hacktivism,ransomware,and cyber extortion; and prepare for the emerging battlefront of cloud-based breaches.
Understand what you need to know about data breaches,the dark web,and markets for stolen data
Limit damage by going beyond conventional incident response
Navigate high-risk payment card breaches in the context of PCI DSS
Assess and mitigate data breach risks associated with vendors and third-party suppliers
Manage compliance requirements associated with healthcare and HIPAA
Quickly respond to ransomware and data exposure cases
Make better decisions about cyber insurance and maximize the value of your policy
Reduce cloud risks and properly prepare for cloud-based data breaches
Data Breaches is indispensable for everyone involved in breach avoidance or response: executives,managers,IT staff,consultants,investigators,students,and more. Read it before a breach happens!
Contents
Preface
Acknowledgments
About the Author
Chapter 1.Dark Matters
Chapter 2.Hazardous Material
Chapter 3.Crisis Management
Chapter 4.Managing DRAMA
Chapter 5.Stolen Data
Chapter 6.Payment Card Breaches
Chapter 7.Retailgeddon
Chapter 8.Supply Chain Risks
Chapter 9.Health Data Breaches
Chapter 10.Exposure and Weaponization
Chapter 11.Extortion
Chapter 12.Cyber Insurance
Chapter 13.Cloud Breaches
Afterword
Index
请登录以查看全部内容 登录