


In today’s litigious business world, cyber-related matters could land you in court. As a computer security professional, you are protecting your data, but are you protecting your company? While you know industry standards and regulations, you may not be a legal expert. Fortunately, in a few hours of reading, rather than months of classroom study, Tari Schreider’s The Manager’s Guide to Cybersecurity Law: Essentials for Today’s Business, lets you integrate legal issues into your security program.
Tari Schreider, a board-certified information security practitioner with a criminal justice administration background, has written a much-needed book that bridges the gap between cybersecurity programs and cybersecurity law. He says, “My nearly 40 years in the fields of cybersecurity, risk management, and disaster recovery have taught me some immutable truths. One of these truths is that failure to consider the law when developing a cybersecurity program results in a protective façade or false sense of security.”

A failure or accident brings your business to a sudden halt. How did it happen? What is at the root of the problem? What keeps it from happening again? Good…

So much to learn – so little time. You are committed to creating a strong organization, ready to survive under all conditions. You need expert advice for best practices…

Information Security Policies Made Easy is the “gold standard” information security policy template library, with over 1500 pre-written information security policies covering 200+ security topics. Based on the 25 year consulting experience of Charles Cresson Wood, CISSP, CISA, it is the most widely used policy library in the world, with 10,000+ customers in 60 countries. Take the work out of creating, writing, and implementing security policies.
Information Security Policies Made Easy has everything you need to build a robust security policy program, delivered by electronic download.

Collect information and evaluate your business environment, identify and reduce risks, analyze business operations, analyze alternatives to respond to disruptions, develop a comprehensive Business Continuity Plan, and to prepare for and respond to hazards-specific events with The Template for Comprehensive Business Continuity Management to Enhance Your Organization’s Resilience.

Check out Rothstein Publishing 's latest eBook Collection titles! Here are a few of our newest titles:
The Manager's Guide to Terrorism, Risk, and Insurance: Essentials for Today's Business
As a manager, you're aware of terrorist acts, are considering the risks, but sense that you need more background. How might terrorism occur? How is it part of risk and threat planning? What insurance strategies might protect your company from financial loss? In a few short chapters, The Manager's Guide to Terrorism, Risk, and Insurance: Essentials for Today'™s Business fills in the blanks for you.
Information Security Policies Made Easy is the “gold standard” information security policy template library, with over 1500 pre-written information security policies covering over 200 security topics. Based on the 25 year consulting experience of Charles Cresson Wood, CISSP, CISA, it is the most widely used policy library in the world, with over 10,000 customers in 60 countries. Take the work out of creating, writing, and implementing security policies.
Information Security Policies Made Easy has everything you need to build a robust security policy program.

Check out Rothstein Publishing 's latest eBook Collection titles! Here are a few of our newest titles:
Creating and Maintaining Resilient Supply Chains
Will your supply chain survive the twists and turns of the global economy? Can it deliver mission-critical supplies and services in the face of disaster or other business interruption? A resilient supply chain can do those things and more. In Creating and Maintaining Resilient Supply Chains, global expert Andrew Hiles applies the principles of risk and business continuity to enable a reliable flow of materials and information that is a "win" for everyone involved. by Andrew Hiles, Hon FBCI, EIoSCM; Kristen Noakes-Fry, ABCI, Editor
A failure or accident brings your business to a sudden halt. How did it happen? What is at the root of the problem? What keeps it from happening again? Good detective work is needed -- but how do you go about it? In this new book, industry pioneer Fred Forck's seven-step cause analysis methodology guides you to the root of the incident, enabling you to act effectively to avoid loss of time, money, productivity, and quality.
One significant difference in Fred's approach to Cause Analysis is that he starts with Success, not failure. You need to be able to clearly define success using objective criteria, not only in results (dollars, product) but also in behaviors.