did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781789550504

Be Cyber Secure Tales, Tools and Threats

by ;
  • ISBN13:

    9781789550504

  • ISBN10:

    1789550505

  • Format: Paperback
  • Copyright: 2021-02-01
  • Publisher: Legend Business
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $26.61

Summary

This important edition focuses on the human factor in training, cautionary tales of breaches that occurred through human error, while also identifying storytelling as an effective tool in cyber eduction. Topics include addressing management issues, approaches to cyber defense, innovative tools for threat respons, recruiting management, and GDPR.

Author Biography

Jonathan Reuvid has originated and edited a series of similar practical investment guides to the UK, to a number of developing countries all the Central and Eastern European countries that became EU members in May 2004, to Morocco and, since 1994, an acclaimed series of guides to doing business with China. An Oxford MA, he was formerly an economist with the French national oil company, CFP, and later Director of European Operations for a US Fortune 500 manufacturing multinational before embarking on a second career on publishing. He has more than 35 published titles to his name. John Lyons is Founder & Chairman of the International Cyber Security Protection Alliance and Chief Executive Officer, Cyber Essentials Direct.

Contributors: 
Deepa Chordiya, AlienVault (San Mateo, CA)
Nick Wilding, AXELOS RESILIA (London)
Christopher Greany, Barclays Bank Group (London)
Karla Jobling, BeecherMadden (London)
Nick Ioannou, Boolean Logical Ltd (London)
Alexander Ellrodt, Deutsche Bank AG (Frankfurt)
Kev Brear, Grant Thornton, LLP (London)
Richard Knowlton, Richard Knowlton Associates (London)
Mike Carter, Layer 8 Ltd. (Bedfordshire)
Amanda Price, Layer 8 Ltd. (Bedfordshire)
Jonathan Reuvid, Legend Business Books (London)
Richard Preece, Oakas Ltd. (Devon)
Mark Barmby, PA Consulting Group (London)
Dan Hyde, Penningtons Manches LLP (London)
Brian Lord OBE, PGI Cyber (Bristol)
John Clelland, Proteus-Cyber Ltd. (London)
Chris Greenslade, Proteus-Cyber Ltd.(London)
Neill Newman, Retail Money Market Ltd (London)

Table of Contents

CONTENTS

Foreword
Preface
Introduction

PART ONE
Cybersecurity in the Information Age
1.1 Building Business Resilience
1.2 Enterprise Scale Vulnerablity Scanning
1.3 Cybercrime – Translating the Tech from the
Floor to the Boardroom
1.4 Cybersecurity: Moving from Awareness to
Understanding
1.5 How Cyber Criminals Make Money
1.6 If SMEs are the Life Blood of the British
Economy, We’ve Cut an Artery

PART TWO
Addressing the Management Issues
2.1 Managing Cyber Risk – The Role of the Board
2.2 Activating the Human Firewall – The Leap from
Knowing to Doing
2.3 The Resilient Organisation – Are We Searching
for Our “Phlogiston”?
2.4 An Action Plan for Response and Damage
Containment
2.5 Addressing the Skills Shortage in Cybersecurity

PART THREE
General Data Protection Regulation
3.1 GDPR – A View from the Frontline
3.2 GDPR – Introducing the UK Regime
3.3 Using Scenario Workshops to Prepare for
GDPR and Other Legislation
3.4 GDPR – Comparative International Regimes
3.5 Intrusion Detection System Evaluation Guide

PART FOUR
Innovative Tools for Cyber
Threat Response
4.1 Identifying Affordable and Cost-effective Solutions
4.2 Detecting Ransomware with Unified Security
4.3 Petya Ransomwware Rapid Response Guide
4.4 The Incident Response Toolkit: Putting the
OODA Loop to Work in the Real World

PART FIVE
Cautionary Tales from the Frontline
5.1 The Power of Storytelling
5.2 How to Avoid That ‘I Told You So’ Moment
5.3 A Cuckoo in the Nest?
5.4 The Trouble with Contractors
5.5 Hacked into a Parallel Universe
List of Contributors
 

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program