*COD & Shipping Charges may apply on certain items.
Review final details at checkout.
₹6305
₹7490
15% OFF
Paperback
All inclusive*
Qty:
1
About The Book
Description
Author
ASIS Book of The Year Runner Up. Selected by ASIS International the worlds largest community of security practitioners.In todays litigious business world cyber-related matters could land you in court. As a computer security professional you are protecting your data but are you protecting your company? While you know industry standards and regulations you may not be a legal expert. Fortunately in a few hours of reading rather than months of classroom study Tari Schreiders Cybersecurity Law Standards and Regulations (2nd Edition) lets you integrate legal issues into your security program.Tari Schreider a board-certified information security practitioner with a criminal justice administration background has written a much-needed book that bridges the gap between cybersecurity programs and cybersecurity law. He says My nearly 40 years in the fields of cybersecurity risk management and disaster recovery have taught me some immutable truths. One of these truths is that failure to consider the law when developing a cybersecurity program results in a protective façade or false sense of security.In a friendly style offering real-world business examples from his own experience supported by a wealth of court cases Schreider covers the range of practical information you will need as you explore - and prepare to apply - cybersecurity law. His practical easy-to-understand explanations help you to: Schreider takes you beyond security standards and regulatory controls to ensure that your current or future cybersecurity program complies with all laws and legal jurisdictions. Hundreds of citations and references allow you to dig deeper as you explore specific topics relevant to your organization or your studies. This book needs to be required reading before your next discussion with your corporate legal department.This new edition responds to the rapid changes in the cybersecurity industry threat landscape and providers. It addresses the increasing risk of zero-day attacks growth of state-sponsored adversaries and consolidation of cybersecurity products and services in addition to the substantial updates of standards source links and cybersecurity products.