The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk

The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk
ISBN-10
0071790403
ISBN-13
9780071790406
Category
Computers
Pages
528
Language
English
Published
2012-08-07
Publisher
McGraw Hill Professional
Authors
Matthew Todd, N. K. McCarthy, Jeff Klaben

Description

Uncertainty and risk, meet planning and action. Reinforce your organization’s security posture using the expert information contained in this tactical guide. The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk shows you how to build and manage successful response plans for the cyber incidents that have become inevitable for organizations of any size. Find out why these plans work. Learn the step-by-step process for developing and managing plans built to address the wide range of issues organizations face in times of crisis. Contains the essentials for developing both data breach and malware outbreak response plans—and best practices for maintaining those plans Features ready-to-implement CIRPs—derived from living incident response plans that have survived the rigors of repeated execution and numerous audits Clearly explains how to minimize the risk of post-event litigation, brand impact, fines and penalties—and how to protect shareholder value Supports corporate compliance with industry standards and requirements, including PCI, HIPAA, SOX, and CA SB-24

Other editions

Similar books

  • Trinity
    By Mark Bagley, Kurt Busiek

    Find out why these plans work. Learn the step-by-step process for developing and managing plans built to address the wide range of issues organizations face in times of crisis.

  • Computer Security Handbook, Set
    By Seymour Bosworth, M. E. Kabay, Eric Whyne

    Incident Response and Computer Forensics, 2nd ed. McGraw-Hill/Osborne, 2003. McCarthy, N. K., M. Todd, and J. Klaben. The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk.

  • Electronic Commerce
    By Gary Schneider

    The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk. New York: McGraw-Hill Osborne. McCracken, H. 2004. “Microsoft's Security Problem—and Ours,” PC World, 22(1), January, 25.

  • Introduction to Cybercrime: Computer Crimes, Laws, and Policing in the 21st Century
    By Nancy E. Marion, Joshua B. Hill

    Explaining cybercrime in a highly networked world, this book provides a comprehensive yet accessible summary of the history, modern developments, and efforts to combat cybercrime in various forms at all levels of government—international, ...

  • Encyclopedia of Crisis Management
    By K. Bradley Penuel, Matt Statler, Ryan Hagen

    In Egress Design Solutions. Washington, DC: International Code Council, 2007. Society of Fire Protection Engineers and National Fire Protection Association. The SFPE Engineering Guide to Performance-Based Fire Protection Analysis and ...

  • Next-Generation Enterprise Security and Governance
    By Mohiuddin Ahmed, Nour Moustafa, Paul Haskell-Dowland

    S. Mohurle and M. Patil, “A brief study of wannacry threat: ransomware attack 2017”. ... N. K. McCarthy, M. Todd, and J. Klaben, The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk.

  • Cyber Security: Everything an Executive Needs to Know
    By Phillip Ferraro

    This book will help you not only understand the modern day threats, but also take action to ensure your company is safe.

  • Cyber Breach: What If Your Defenses Fail? Designing an Exercise to Map a Ready Strategy
    By Regina Phelps

    This book shows Business Continuity Planners, Crisis Managers and their IT counterparts how to stage a cyber incident exercise that will test preparedness, surface unconsidered circumstances, and sharpen the responsiveness of everyone from ...

  • Computer and Information Security Handbook
    By John R. Vacca

    Chapters new to this edition include such timely topics as Cyber Warfare, Endpoint Security, Ethical Hacking, Internet of Things Security, Nanoscale Networking and Communications Security, Social Engineering, System Forensics, Wireless ...

  • Chairman of the Joint Chiefs of Staff Manual: Cyber Incident Handling Program
    By Chairman of the Joint Chiefs of Staff

    This manual describes the Department of Defense (DoD) Cyber Incident Handling Program and specifies its major processes, implementation requirements, and related U.S. government interactions.