What To Do When You Get Hacked
eBook - ePub

What To Do When You Get Hacked

A Practitioner's Guide to Incident Response in the 21st Century

  1. 176 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

What To Do When You Get Hacked

A Practitioner's Guide to Incident Response in the 21st Century

Book details
Table of contents
Citations

About This Book

What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century teaches you everything that you need to know about preparing your company for a potential data breach. We begin by talking about what the latest cybersecurity threats and attacks are that your company needs to be prepared for. Once we establish that, we go into the different phases of the incident response lifecycle based on the NIST framework. This will teach you how to properly prepare and respond to cybersecurity incidents so that you can be sure to minimize damage and fulfill all of your legal requirements during a cyberattack. This book is meant for the everyday business owner and makes these concepts simple to understand and apply.

Frequently asked questions

Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes, you can access What To Do When You Get Hacked by Shimon Brathwaite in PDF and/or ePUB format, as well as other popular books in Computer Science & Cryptography. We have over one million books available in our catalogue for you to explore.

Information

Publisher
CRC Press
Year
2022
ISBN
9781000779790
Edition
1

Table of contents

  1. Cover Page
  2. Half Title page
  3. Title Page
  4. Copyright Page
  5. Contents
  6. Chapter 1 What Is the Cybersecurity Epidemic?
  7. Chapter 2 What Am I Defending My Company from?
  8. Chapter 3 How to Get Started with Your Cybersecurity Program
  9. Chapter 4 Why Do You Need Cyber Insurance?
  10. Chapter 5 Compliance Regulations You Need to Be Aware of
  11. Chapter 6 How to Be Prepared for Insider Threats
  12. Chapter 7 How to Build an Effective Incident Response Team
  13. Chapter 8 How to Pitch for a Quality Cybersecurity Budget
  14. Chapter 9 Why You Need Continuous Security Validation
  15. Chapter 10 The Importance of Routine Simulations
  16. Chapter 11 The Six Steps to Preparing for a Cybersecurity Incident
  17. Chapter 12 How to Analyze a Potential Cybersecurity Incident
  18. Chapter 13 Steps to Containing a Cybersecurity Incident
  19. Chapter 14 How to Eradicate and Recover from a Cybersecurity Incident
  20. Chapter 15 What to Do If You Don’t Have the Internal Expertise You Need
  21. Chapter 16 How to Handle Third-Party Vendors That Have Suffered a Data Breach
  22. Chapter 17 How to Remove Data Leaks Once They Are on the Internet
  23. Chapter 18 How to Address the Public During a Data Breach
  24. Chapter 19 How to Handle Disgruntled Customers During a Data Breach
  25. Chapter 20 When Should I Get Law Enforcement Involved?
  26. Chapter 21 Public Authorities You Should Notify Throughout a Data Breach
  27. Conclusion
  28. Sources
  29. Index