Chapter 1: Why Risk does Not Depend on Company Size
Propagation of damage (downstream effects)
Ability to improvise / make quick decisions
Chapter 2: Getting your Risk Profile Right
Chapter 4: General Avoidance and Mitigation Strategies
Introduction – general aspects, avoidance and related ISO27001 controls
Strategies and tactics for treating breaches
Dimensions of treatment / mitigation of information security breaches ...
No credit card required