Security-First Compliance for Small Businesses - Walsh, Karen
- Format: Relié Voir le descriptif
Vous en avez un à vendre ?
Vendez-le-vôtreSoyez informé(e) par e-mail dès l'arrivée de cet article
Créer une alerte prix- Payez directement sur Rakuten (CB, PayPal, 4xCB...)
- Récupérez le produit directement chez le vendeur
- Rakuten vous rembourse en cas de problème
Gratuit et sans engagement
Félicitations !
Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !
TROUVER UN MAGASIN
Retour
Avis sur Security - First Compliance For Small Businesses Format Relié - Livre Économie
0 avis sur Security - First Compliance For Small Businesses Format Relié - Livre Économie
Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.
Présentation Security - First Compliance For Small Businesses Format Relié
- Livre Économie
Résumé :
This book bridges the gap between complex technical language and business objectives to create a security-first review of the security and compliance landscapes. It has practical solutions for businesses to create cybersustainable security-focused policies, processes, and controls to protect today's future for tomorrow's digital ecosystem....
Biographie: Karen Walsh passed the Connecticut Bar in 2004. She then worked as a Bank Secrecy Act internal auditor and contract compliance manager for fourteen years before discovering her passion for cybersecurity and privacy compliance. She spent eleven years teaching first-year college writing and applies many of the same pedagogical approaches to writing about information security. The ISACA Journal published her coauthored pieces on cybersustainability in 2019. Her book 100 Geek Heroines was published by ABC-CLIO, part of Bloomsbury, in October 2019, and she has also authored chapters in At Home in the Whedonverse (MacFarland, 2017) and Transmediating the Whedonverse (Springer, 2019).
Sommaire: Chapter 1 Into the Mind of a Malicious Actor Chapter 2 Reviewing the Compliance Landscape Chapter 3 Compliance Risk Chapter 4 Looking at Risk through a Security Lens Chapter 5 How to Set Controls Chapter 6 Continuous Monitoring Chapter 7 Vendor Risk Management: Securing the Supply Chain Chapter 8 Calculating the Total Cost of Compliance Chapter 9 Information Security Audit: The What, How, and Why Chapter 10 Cyber Liability Insurance Chapter 11 Cybersustai nability: Ethical Data Handling for Corporate Responsibility Chapter 12 Magic 8 Ball Says Yes