Book description
Even when organisations take precautions, they may still be at risk of a data breach. Information security incidents do not just affect small businesses; major companies and government departments suffer from them as well.
A strategic framework
Managing Information Security Breaches sets out a strategic framework for handling this kind of emergency. It focuses on the treatment of severe breaches and on how to re-establish safety and security once the breach has occurred. These recommendations support the controls for the treatment of breaches specified under ISO27001:2005.
Top priorities
The actions you take in response to a data breach can have a significant impact on your company's future. Michael Krausz explains what your top priorities should be the moment you realise a breach has occurred. This book is essential reading for security officers, IT managers and company directors.
Read this guide and learn how to …
- Avoid information security breaches
The author uses cases he has investigated to illustrate the various causes of a breach, ranging from the chance theft of a laptop at an airport to more systematic forms of data theft by criminal networks. By analysing situations companies have experienced in real life, the case studies can give you a unique insight into the best way for your organisation to avoid a data breach. - Plan your response
If something did go wrong, how would you handle it? Even if you have done everything possible to prevent a data breach, you still need to know what to do, should one occur. This book offers advice on the strategies and tactics to apply in order to identify the source of the leak, keep the damage to a minimum, and recover as swiftly as possible. - Preserve the trust of your customers
If your company ever experiences an information security incident, then the way your customers see you will depend on how you react. This book tells you the key steps you need to take to hold on to the goodwill of your customers if a data breach occurs. The book also offers advice on what to do if you discover defamatory material about your business on YouTube or on forum sites. - Improve management processes
Information security breaches are committed, often by ambitious or embittered employees. This book looks at ways to reduce the risk of staff selling product designs or customer data to your competitors for personal gain.
This book provides a general discussion of, and a source of learning about, what information security breaches are, how they can be treated and what ISO27001 can offer in that regard, spiced with a number of real-life stories of information security incidents and breaches. It is a 'first line of defence' for the reader who is affected by an incident and wants to turn to a source of guidance and direction.
Make sure your team is prepared before an information security incident – buy this book today!
Table of contents
- MANAGING INFORMATION SECURITY BREACHES
-
Managing Information Security Breaches
- FOREWORD
- PREFACE
- ABOUT THE AUTHOR
- ACKNOWLEDGEMENTS
- CONTENTS
- Introduction
-
PART 1 – GENERAL
- CHAPTER 1: WHY RISK DOES NOT DEPEND ON COMPANY SIZE
- CHAPTER 2: GETTING YOUR RISK PROFILE RIGHT
- CHAPTER 3: WHAT IS A BREACH?
-
CHAPTER 4: GENERAL AVOIDANCE AND MITIGATION STRATEGIES
- Introduction – general aspects / avoidance and related ISO27001 controls
- People
- A.8.1.1 – Roles and responsibilities
- A.8.1.2 – Screening
- Methods of screening
- A.8.1.3 – Terms and conditions of employment
- A.8.2.1 – Management responsibilities
- A.8.2.2 – Information security awareness, education and training
- A.8.2.3 – Disciplinary process
- A.8.3.1 – Termination responsibilities
- A.8.3.2 – Return of assets
- A.8.3.3 – Removal of access rights
- Processes
- 4.2.1d – Identify risks
- 4.2.1e – Analyse and evaluate the risks
- 4.2.1f – Identify and evaluate options for the treatment of risks
- 4.2.1g – Select control objectives and controls for the treatment of risks
- 4.2.1h – Obtain management approval of the proposed residual risks
- Technology
- ISO27001 Controls helpful for treatment of breaches
- A.6.1.6 – Contact with authorities
- A.8.2.2 – Information security awareness, education and training
- A.8.2.3 – Disciplinary process
- A.8.3.2 – Return of assets
- A.8.3.3 – Removal of access rights
- A.10.4.1 – Controls against malicious code
- A.10.10.1 – Audit logging
- A.10.10.3 – Protection of log information
- A.12.5.4 – Information leakage
- A.13.1.1 – Reporting information security events
- A.13.1.2 – Reporting security weaknesses
- A.13.2.1 – Responsibilities and procedures
- A.13.2.2 – Learning from information security incidents
- A.13.2.3 – Collection of evidence
- Strategies and tactics for treating breaches
- Get the 6 Ws immediately
- Establish lessons learned
- Get PR involved
- Be prepared
- Tactical advice
- Regular meetings
- Time, time, time
- Rest
- People (number)
- International contacts
- Keep the information flowing
- Keep minutes
- Additional quality feedback
- Dimensions of treatment / mitigation of information security breaches
- None
- Internal investigation
- External investigation
- Joint task force
-
PART 2 – CASE STUDIES
- CHAPTER 5: NOTES FROM THE FIELD
- CHAPTER 6: MOTIVES AND REASONS
- CHAPTER 7: CASE STUDIES FROM SMALL COMPANIES
-
CHAPTER 8: CASE STUDIES FROM MEDIUM-SIZED COMPANIES
- A case of intrigue – the missing contract
- In-depth explanation
- Lessons learned
- The sales manager who changed jobs
- In-depth explanation
- Lessons learned
- The project manager who became a friend; and then an enemy
- In-depth explanation
- The lost customers – how a sales manager cost a company 10% of revenue
- In-depth explanation
- Lessons learned
- The flood – how not to learn about risk management
- In-depth explanation
-
CHAPTER 9: CASE STUDIES FROM LARGE CORPORATIONS
- Who wants my data? – a case of data theft
- In-depth explanation
- Lessons learned
- Who wants my data? – a more complicated case
- In-depth explanation
- Hard disk for sale – beware of your contractors
- In-depth explanation
- Unauthorised domain links – it is easy to harm a company’s reputation
- In-depth explanation
- The trusted guard who was not
- In-depth explanation
- Insider badmouthing
- In-depth explanation
- The software vulnerability that was not – a case of blackmail
- In-depth explanation
- Lessons learned
- PART 3 – A SAMPLE TREATMENT PROCESS
Product information
- Title: Managing Information Security Breaches: Studies from Real Life
- Author(s):
- Release date: November 2010
- Publisher(s): IT Governance Publishing
- ISBN: 9781849281539
You might also like
book
Managing Information Security: Studies from real life
A comprehensive guide to managing an information security incident Even when organisations take precautions, they may …
book
Information Security Policy Development for Compliance
Although compliance standards can be helpful guides to writing comprehensive security policies, many of the standards …
book
Business Continuity and the Pandemic Threat - Learning from COVID-19 while preparing for the next pandemic
The book looks at case studies, reviewing how different industries have been impacted by the pandemic, …
article
The New Rules for Crisis Management
In today’s world, the traditional news media do not always control how crises unfold. Executives may …