Skip to content Skip to sidebar Skip to footer
cybersecurity-law-standards-regulations-rothstein-publishing

Free Chapter: Introduction to Cybersecurity Law

This free chapter is an introduction to cybersecurity law from Tari Schreider's new book Cybersecurity Law, Standards and Regulations (2nd Edition) In today’s litigious business world, cyber-related matters could land you in court. As a computer security professional, you are protecting your data, but are you protecting your company? While you know industry standards and regulations,…

Read More

Critical Infrastructure Risk Assessment: The Definitive Threat Identification and Threat Reduction Handbook free chapter by rothstein publishing

FREE CHAPTER: Critical Infrastructure Risk Assessment: The Power of the Observation

In this chapter you will discover: • An overview of the concept of an “observation.” • The primary elements included in the observation as well as its format. • Fundamental considerations when performing and documenting the observation including the power of one’s influence on the actions being observed, the need for critical thinking, and considerations…

Read More

Critical Infrastructure Risk Assessment: The Definitive Threat Identification and Threat Reduction Handbook free chapter by rothstein publishing

FREE CHAPTER: Critical Infrastructure Risk Assessment: The Power of the Observation

In this chapter you will discover: • An overview of the concept of an “observation.” • The primary elements included in the observation as well as its format. • Fundamental considerations when performing and documenting the observation including the power of one’s influence on the actions being observed, the need for critical thinking, and considerations…

Read More

cybersecurity-program-security-manager-handbook-rothstein-publishing

Is YOUR CyberSecurity Program Up to the Challenge?

What about the legal aspects of cybersecurity? ARE YOU AT RISK?

With critical information assets at risk, your company requires a state-of-the-art cybersecurity program. But how do you achieve the best possible program? Tari Schreider, in Building Effective Cybersecurity Programs: A Security Manager’s Handbook, lays out the step-by-step roadmap to follow as you build or enhance your cybersecurity program. Building Effective Cybersecurity Programs: A Security Manager’s Handbook is organized around the six main steps on the roadmap that will put your cybersecurity program in place:
  1. Design a Cybersecurity Program.
  2. Establish a Foundation of Governance.
  3. Build a Threat, Vulnerability Detection, and Intelligence Capability.
  4. Build a Cyber Risk Management Capability.
  5. Implement a Defense-in-Depth Strategy.
  6. Apply Service Management to Cybersecurity Programs.

Read More

Your Guide to Cybersecurity Law

In today’s litigious business world, cyber-related matters could land you in court. As a computer security professional, you are protecting your data, but are you protecting your company? While you know industry standards and regulations, you may not be a legal expert. Fortunately, in a few hours of reading, rather than months of classroom study, Tari Schreider’s The Manager’s Guide to Cybersecurity Law: Essentials for Today’s Business, lets you integrate legal issues into your security program. Tari Schreider, a board-certified information security practitioner with a criminal justice administration background, has written a much-needed book that bridges the gap between cybersecurity programs and cybersecurity law. He says, “My nearly 40 years in the fields of cybersecurity, risk management, and disaster recovery have taught me some immutable truths. One of these truths is that failure to consider the law when developing a cybersecurity program results in a protective façade or false sense of security.”

Read More

E-mail
Password
Confirm Password