Information Security Breaches: Avoidance and Treatment Based on Iso27001 - Michael Krausz - Books - IT Governance Publishing - 9781849285834 - May 27, 2014
In case cover and title do not match, the title is correct

Information Security Breaches: Avoidance and Treatment Based on Iso27001 Two edition

Michael Krausz

Price
€ 25.49

Ordered from remote warehouse

Expected delivery Nov 25 - Dec 4
Add to your iMusic wish list

Information Security Breaches: Avoidance and Treatment Based on Iso27001 Two edition

This pocket guide provides a general discussion of what information security breaches are, how they can be treated, and what ISO27001 offers in that respect, illustrated with details of real-life information security incidents. If something happens, your company needs to be ready to take prompt and decisive action to resolve the issue. This book tells you the plans and procedures you need to put in place to tackle an information security breach should it occur. In particular, the book gives you clear guidance on how to treat an information security breach in accordance with ISO27001:2013. If a breach occurs, the evidence needs to be secured professionally. You need to know the rules on evidence gathering, and you need to be capable of isolating the suspect laptops right from the start. If you want your company to respond rapidly to an information security breach, you need to make sure that the responsibilities and roles in your company are clearly defined. Benefits to business include: Recover faster An information security breach can have crippling consequences. However, with the right emergency measures in place, you will be able to recover quickly from the incident and resume normal operations. Preserve customer confidence An information security breach can result in loss of records and disruption to service. This can do serious damage to your relationship with your customers. It is vital for you to be prepared for an information security breach, so that if it ever happens you can preserve customer confidence. Assist the investigation Uncovering the root causes of an information security breach requires detective work. If an information security breach occurs, the investigators will need to be able to identify the problem. You can help them to do that by keeping proper records. Catch the criminals In the event of data theft, you will want to be in a position to act promptly and decisively. So you should set up an incident management system. This will mean that in the event of data theft, the police will have a greater chance of getting hold of the incriminating evidence they need to secure a conviction.

Media Books     Paperback Book   (Book with soft cover and glued back)
Released May 27, 2014
ISBN13 9781849285834
Publishers IT Governance Publishing
Pages 64
Dimensions 111 × 178 × 3 mm   ·   45 g
Language English  

Show all

More by Michael Krausz