No credit card required
Part 1 – General
Chapter 1: Why Risk does Not Depend on Company Size
Propagation of damage (downstream effects)
Information security staff
Cash reserves / cash at hand
Ability to improvise / make quick decisions
Contacts with authority
Chapter 2: Getting your Risk Profile Right
Intuitive risk analysis
Formal risk analysis
Chapter 3: What is a Breach?
Chapter 4: General Avoidance and Mitigation Strategies
Introduction – general aspects, avoidance and related ISO27001 controls
Strategies and tactics for treating breaches
Dimensions of treatment / mitigation of information security breaches ...