This pocket guide uses case studies to illustrate the possible breach scenarios that an organisation can face. It sets out a sensible, realistic assessment of the actual costs of a data or information breach and explains how managers can determine the business damage caused.
This pocket guide uses case studies to illustrate the possible security breach scenarios that an organisation can face. It sets out a sensible, realistic assessment of the actual costs of a data or information breach and explains how managers can determine the business damage caused.
Muu info
Essential advice on developing a cyber security system that is right for your organisation.
Introduction |
|
1 | (2) |
|
Chapter 1 The Daily Breach |
|
|
3 | (6) |
|
Chapter 2 Information Security and Business Risk |
|
|
9 | (12) |
|
Chapter 3 Cost Factors of a Breach |
|
|
21 | (16) |
|
|
37 | (22) |
|
Chapter 5 A Brief Checklist |
|
|
59 | (4) |
|
|
63 | (2) |
ITG Resources |
|
65 | |
Michael Krausz studied Physics, Computer Science and Law at the University of Technology, Vienna University and Webster University. In order to combine his two main hobbies, computers and investigations, he chose to become a professional investigator and IT expert. Over the course of his career he has investigated over a hundred cases of information security breaches, usually connected with white-collar crime. Michael Krausz is an ISO 27001 auditor and has delivered over 5000 hours of professional and academic training. He has provided consulting or investigation services in 12 countries to date.
John Walker has over 30 years experience in the world of IT, and Cyber Security, is a Visiting Professor at the School of Science and Technology at Nottingham Trent University (NTU), Visiting Professor/Lecturer at the University of Slavonia [ to 2015], CTO of SBLTD, and holds the position as a Board Director of Cyber Research at the Ascot Barclay Group. John is an Expert Witness, ENISA CEI Listed Expert, Editorial Member of the Cyber Security Research Institute (CRSI), a Fellow of the British Computer Society (BCS), and is a Member of the Editorial Board at the Executive Risk Magazine [ ERM].