0%

Get to grips with cybersecurity and privacy laws to protect your company's data and comply with international privacy standards

Key Features

  • Comply with cybersecurity standards and protect your data from hackers
  • Find the gaps in your company's security posture with gap analysis and business impact analysis
  • Understand what you need to do with security and privacy without needing to pay consultants

Book Description

Cybercriminals are incessantly coming up with new ways to compromise online systems and wreak havoc, creating an ever-growing need for cybersecurity practitioners in every organization across the globe who understand international security standards, such as the ISO27k family of standards.

If you're looking to ensure that your company's data conforms to these standards, Cybersecurity and Privacy Law Handbook has got you covered. It'll not only equip you with the rudiments of cybersecurity but also guide you through privacy laws and explain how you can ensure compliance to protect yourself from cybercrime and avoid the hefty fines imposed for non-compliance with standards.

Assuming that you're new to the field, this book starts by introducing cybersecurity frameworks and concepts used throughout the chapters. You'll understand why privacy is paramount and how to find the security gaps in your company's systems. There's a practical element to the book as well—you'll prepare policies and procedures to prevent your company from being breached. You'll complete your learning journey by exploring cloud security and the complex nature of privacy laws in the US.

By the end of this cybersecurity book, you'll be well-placed to protect your company's data and comply with the relevant standards.

What you will learn

  • Strengthen the cybersecurity posture throughout your organization
  • Use both ISO27001 and NIST to make a better security framework
  • Understand privacy laws such as GDPR, PCI CSS, HIPAA, and FTC
  • Discover how to implement training to raise cybersecurity awareness
  • Find out how to comply with cloud privacy regulations
  • Examine the complex privacy laws in the US

Who this book is for

If you're a seasoned pro with IT security and / or cybersecurity, this book isn't for you. This book is aimed at novices, freshers, students, experts in other fields, and managers, that, are willing to learn, understand, and manage how a security function is working, especially if you need to be. Although the reader will be able, by reading this book, to build and manage a security function on their own, it is highly recommended to supervise a team devoted to implementing cybersecurity and privacy practices in an organization.

Table of Contents

  1. Cybersecurity and Privacy Law Handbook
  2. Contributors
  3. About the author
  4. About the reviewer
  5. Preface
  6. Part 1: Start From the Basics
  7. Chapter 1: ISO27001 – Definitions and Security Concepts
  8. Part 2: Into the Wild
  9. Chapter 2: Mandatory Requirements
  10. Chapter 3: Data Protection
  11. Chapter 4: Data Processing
  12. Chapter 5: Security Planning and Risk Management
  13. Part 3: Escape from Chaos
  14. Chapter 6: Define ISO 27001 Mandatory Requirements
  15. Chapter 7: Risk Management, Controls, and Policies
  16. Chapter 8: Preparing Policies and Procedures to Avoid Internal Risk
  17. Chapter 9: Social Engineering, Password Guidance, and Policy
  18. Chapter 10: The Cloud
  19. Chapter 11: What about the US?
  20. Appendix
  21. Index
  22. Other Books You May Enjoy
3.138.141.202