0%

Protect business value, stay compliant with global regulations, and meet stakeholder demands with this privacy how-to

Privacy, Regulations, and Cybersecurity: The Essential Business Guide is your guide to understanding what “privacy” really means in a corporate environment: how privacy is different from cybersecurity, why privacy is essential for your business, and how to build privacy protections into your overall cybersecurity plan.

First, author Chris Moschovitis walks you through our evolving definitions of privacy, from the ancient world all the way to the General Law on Data Protection (GDPR).  He then explains—in friendly, accessible language—how to orient your preexisting cybersecurity program toward privacy, and how to make sure your systems are compliant with current regulations.

This book—a sequel to Moschovitis’ well-received Cybersecurity Program Development for Business—explains which regulations apply in which regions, how they relate to the end goal of privacy, and how to build privacy into both new and existing cybersecurity programs. Keeping up with swiftly changing technology and business landscapes is no easy task. Moschovitis provides down-to-earth, actionable advice on how to avoid dangerous privacy leaks and protect your valuable data assets.

  • Learn how to design your cybersecurity program with privacy in mind
  • Apply lessons from the GDPR and other landmark laws
  • Remain compliant and even get ahead of the curve, as privacy grows from a buzzword to a business must
  • Learn how to protect what’s of value to your company and your stakeholders, regardless of business size or industry
  • Understand privacy regulations from a business standpoint, including which regulations apply and what they require
  • Think through what privacy protections will mean in the post-COVID environment

Whether you’re new to cybersecurity or already have the fundamentals, this book will help you design and build a privacy-centric, regulation-compliant cybersecurity program.

Table of Contents

  1. COVER
  2. TITLE PAGE
  3. COPYRIGHT
  4. FOREWORD
  5. PREFACE
  6. ABOUT THE AUTHOR
  7. ACKNOWLEDGMENTS
  8. PART ONE: Privacy
    1. CHAPTER 1: Understanding Privacy
    2. CHAPTER 2: A (Very) Brief History of Privacy
    3. The Legal Case for Privacy (the Big Print)
    4. Slouching toward Privacy
    5. Debating Privacy in the US
    6. Confidentiality vs. Privacy
    7. CHAPTER 3: The Legal Case for Privacy (the Finer Print)
    8. International Privacy Legislation
  9. PART TWO: Regulations
    1. CHAPTER 4: Introduction to Regulations
    2. Preparing to Take Charge
    3. Creating Your Privacy Profile
    4. Know before You Go: Using the Regulations Section
    5. One Last Thing before We Go!
    6. CHAPTER 5: North American Regulations
    7. United States
    8. Federal Regulations
    9. State Regulations
    10. California
    11. Maine
    12. Amendment to the Nevada Privacy of Information Collected on the Internet from Consumers Act via SB 220
    13. Data Protection in the United States: Conclusions
    14. Canada
    15. Mexico
    16. CHAPTER 6: European Regulations
    17. Non-EU Member European Countries
    18. Russia
    19. Switzerland
    20. Coming Soon to a European Union Near You!
    21. CHAPTER 7: Asia-Pacific Regulations
    22. China
    23. India
    24. Japan
    25. Australia
    26. CHAPTER 8: African Regulations
    27. Economic Community of West African States
    28. Nigeria
    29. South Africa
    30. Egypt
    31. CHAPTER 9: South American Regulations
    32. Brazil
    33. Argentina
    34. Colombia
  10. PART THREE: Privacy and Cybersecurity
    1. CHAPTER 10: Introduction to Cybersecurity
    2. Everything You Always Wanted to Know About Tech (But Were Afraid to Ask Your Kids)
    3. In the Beginning1…
    4. Key Definitions
    5. Note
    6. CHAPTER 11: A Cybersecurity Primer
    7. Cybersecurity Defined
    8. Confidentiality
    9. Integrity
    10. Availability
    11. Safety
    12. Measuring Cybersecurity's Success
    13. Ensuring and Preserving
    14. Cybersecurity Controls and Defense in Depth
    15. Defense in Depth
    16. The Threats
    17. Threat Agents
    18. Key Trends Influencing Threat Agents
    19. The Nature of Hackers
    20. Attack Process
    21. Types of Attacks
    22. A Brief Cyberglossary
    23. CHAPTER 12: Privacy-Centric Cybersecurity Program Overview
    24. What's the Point of It All?
    25. Vision and Mission Statements
    26. Culture and Strategy
    27. Off to See the Wizard
    28. What Does Organizational IT Typically Look Like?
    29. What's at Risk?
    30. Threat Assessment
    31. At the Club House Turn!
    32. Mitigating Risk
    33. Incident Response Planning
    34. CHAPTER 13: Privacy by Design Overview
    35. The Case for Frameworks
    36. CHAPTER 14: Cover Your Assets!
    37. Asset Classification
    38. Asset Metadata
    39. A Fleeting Glimpse into the Other Side
    40. Business Impact Analysis
    41. One Spreadsheet to Rule Them All
    42. CHAPTER 15: Threat Assessment
    43. Types of Threats
    44. Internal Threats
    45. External Threats
    46. Threat Rankings
    47. Threat Intelligence
    48. Threat Modeling
    49. CHAPTER 16: Vulnerabilities
    50. Who's Who in Vulnerabilities Tracking
    51. Vulnerabilities: Mapping and Remediation
    52. Vulnerability Testing
    53. CHAPTER 17: Environments
    54. On-Premises Computing Environments
    55. Private Cloud Computing Environments
    56. Public Cloud Computing Environments
    57. Hybrid Cloud Computing Environments
    58. Cloud Security Questions
    59. The Internet of Things (IoT)
    60. Distributed Workforces
    61. CHAPTER 18: Controls
    62. Preventative Controls
    63. Detective Controls
    64. Corrective Controls
    65. Compensatory Controls
    66. Defense in Depth
    67. Privacy and Cybersecurity Controls
    68. People, Technology, and Operations
    69. Communications
    70. Policies, Standards, Procedures, and Guidelines
    71. Putting It All Together
    72. CHAPTER 19: Incident Response
    73. Incident Response Planning: Not Just a Good Idea—It's the Law!
    74. Incident-Response Plan Phases
    75. Preparing Your Incident-Response Plan
    76. Identifying Incidents
    77. Containing Incidents
    78. Treating Incidents
    79. Incident Recovery
    80. Post-Incident Review
    81. Do It All Over Again!
    82. CHAPTER 20: Welcome to the Future! Now, Go Home!
    83. Social Transformation
    84. Technology Transformation
    85. Business Transformation
    86. The Story of ACME
    87. Final Words
  11. BIBLIOGRAPHY
    1. History, Case Law, and Legal Analysis
    2. Legislation, Regulation, and Analysis
    3. Information Technology, Design, and Privacy
    4. Threat and Incident Reports
    5. Future Trends
    6. Selected Bibliography from Cybersecurity Program Development for Business: The Essential Planning Guide (Wiley 2018)
  12. INDEX
  13. END USER LICENSE AGREEMENT
3.128.171.246