This free chapter is from the new book Cybersecurity Law, Standards and Regulations (2nd Edition) by Tari Schreider
In today’s litigious business world, cyber-relateted matters could land you in court. As a computer security professional, you are protecting your data, but are you protecting your company? While you know industry standards and regulations, you may…
In a world where science and expertise are under attack, communicators know how hard it is to fully convey the impact of events which rely on catastrophic statistics.
This free excerpt from the new book Building an Effective Cybersecurity Program, 2nd Edition, by Tari Schreider C|CISO, CRISC, ITIL® Foundation, MCRP, SSCP will help you to begin Building YOUR Cyber Threat, Vulnerability Detection, and Intelligence Capability.
This chapter will help you to:
Understand the relationship between cyber threats and vulnerabilities.
Understand how to identify…
The world lost an amazing man on New Year's Eve, Jim Burtles.
I first met Jim at a conference over two decades ago. His warmth, eagerness to share his knowledge and experience, and enthusiasm left an immediate and lasting impression.
Among other achievements, Jim was a widely respected expert on business continuity, a founding Fellow of the…
Risk Assessments Dig Deeper than the Obvious
By Ernie Hayden CISSP GICSP(Gold) PSP
In September 2020, my book, Critical Infrastructure Risk Assessment, was published. In the book I discuss ways and means to analyze the threats and vulnerabilities posed on Critical Infrastructure. Last week, as I watched the events at the United States Capitol, I…
How to Respond When Your Brand Comes Under Political Attack
by Tony Jaques PhD, Director of Issue Outcomes Pty Ltd, for people who work in issue and crisis management, author of Crisis Counsel: Navigating Legal and Communication Conflict.
While the American election is finally over, one company is still monitoring for potential damage after being…
What’s new in INFORMATION SECURITY POLICIES MADE EASY Version 14?
– Security Policy Library Update for the Common Policy Library (CPL)
– Updated Security Policy Mappings
– 39 Updated “Ready-to-Go” Sample Security Policy Templates
– Additional New Compliance Documents
– 60+ New Information Security Policies