Optimal Spending on Cybersecurity Measures - Tara Kissoon

Optimal Spending on Cybersecurity Measures

Digital Privacy and Data Protection

(Autor)

Buch | Hardcover
290 Seiten
2024
CRC Press (Verlag)
978-1-032-80247-3 (ISBN)
137,15 inkl. MwSt
This book introduces the cyber risk investment model, and the cybersecurity risk management framework used within business driven risk assessments to meet the intent of Privacy and Data Protection Laws. The aim of this book is to demonstrate the use of business driven risk assessments to meet the requirements within privacy laws.
The aim of this book is to demonstrate the use of business- driven risk assessments to meet the requirements within privacy laws.

This book introduces the cyber risk investment model and the cybersecurity risk management framework used within business-driven risk assessments to meet the intent of privacy and data protection laws. This can be used by various stakeholders involved in the implementation of cybersecurity measures to safeguard sensitive data. This framework facilitates an organization’s risk management decision- making process to demonstrate the mechanisms in place to fund cybersecurity measures to meet privacy laws and demonstrates the application of the process using two case studies: CatchMyData and Rapid Cloud Migration. This book also discusses the elements used within the cybersecurity risk management process and defines a strategic approach to minimize cybersecurity risks.

Features



Aims to strengthen the reader’s understanding of industry governance, risk and compliance practices
Incorporates an innovative approach to assess business risk management
Explores the strategic decisions made by organizations when implementing cybersecurity measures and leverages an integrated approach to include risk management elements

Sherita-Tara (Tara) Kissoon is multi-certified I.T. Risk & Security Leader with twenty-five years of technology experience, twenty years of experience in the financial services industry. Tara’s educational background encompasses a Master of Science (MSc) in Information Security with Upper Class Honours at the University of London, Royal Holloway College, a Master of Business Administration (MBA) with Distinction at the University of Toronto, Rotman School of Management, a Certified Information Systems Auditor (CISA), a Certified Information Systems Security Professional (CISSP) and is licenced within the Life Licenced Qualification Program (LLQP). Details are located @ www.thevirtualmall.ca.

Preface. Chapter 1: Introduction. Chapter 2: Privacy by Design. Chapter 3: Data Protection. Chapter 4: Data Protection Impact Assessment. Chapter 5: Governance. Chapter 6: Cybersecurity Risk Management Framework. Chapter 7: Case Study #1: Course Registration System. Chapter 8: Case Study #2: AWS Rapid Cloud Migration Program. References.

Erscheinungsdatum
Zusatzinfo 39 Tables, black and white; 17 Line drawings, black and white; 1 Halftones, black and white; 18 Illustrations, black and white
Verlagsort London
Sprache englisch
Maße 156 x 234 mm
Gewicht 712 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Mathematik / Informatik Informatik Theorie / Studium
Recht / Steuern Privatrecht / Bürgerliches Recht IT-Recht
Wirtschaft Volkswirtschaftslehre
ISBN-10 1-032-80247-2 / 1032802472
ISBN-13 978-1-032-80247-3 / 9781032802473
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
34,99

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
28,00