Skip to content Skip to sidebar Skip to footer
building-effective-cybersecurity-program-rothstein-publishing

Free Excerpt: Building a Cyber Threat, Vulnerability Detection, and Intelligence Capability

This free excerpt from the new book Building an Effective Cybersecurity Program, 2nd Edition, by Tari Schreider C|CISO, CRISC, ITIL® Foundation, MCRP, SSCP will help you to begin Building YOUR Cyber Threat, Vulnerability Detection, and Intelligence Capability. This chapter will help you to: Understand the relationship between cyber threats and vulnerabilities. Understand how to identify…

Read More

Critical Infrastructure Risk Assessment: The Definitive Threat Identification and Threat Reduction Handbook free chapter by rothstein publishing

FREE CHAPTER: Critical Infrastructure Risk Assessment: The Power of the Observation

In this chapter you will discover: • An overview of the concept of an “observation.” • The primary elements included in the observation as well as its format. • Fundamental considerations when performing and documenting the observation including the power of one’s influence on the actions being observed, the need for critical thinking, and considerations…

Read More

Critical Infrastructure Risk Assessment: The Definitive Threat Identification and Threat Reduction Handbook free chapter by rothstein publishing

FREE CHAPTER: Critical Infrastructure Risk Assessment: The Power of the Observation

In this chapter you will discover: • An overview of the concept of an “observation.” • The primary elements included in the observation as well as its format. • Fundamental considerations when performing and documenting the observation including the power of one’s influence on the actions being observed, the need for critical thinking, and considerations…

Read More

cybersecurity-law-standards-regulations-rothstein-publishing

Book Review: Cybersecurity Law, Standards, and Regulations, Second Edition

Check out this book review from Security Management Magazine, a publication of ASIS International on Cybersecurity Law, Standards, and Regulations, Second Edition, by Tari Schreider Reviewed by Ronald L. Mendell, 1 September 2020 Click here for the Print Issue: September 2020 Click here to read the full Cybersecurity Law Book Review. "Information security generalists who…

Read More

E-mail
Password
Confirm Password