Book description
Protect business value, stay compliant with global regulations, and meet stakeholder demands with this privacy how-to
Privacy, Regulations, and Cybersecurity: The Essential Business Guide is your guide to understanding what “privacy” really means in a corporate environment: how privacy is different from cybersecurity, why privacy is essential for your business, and how to build privacy protections into your overall cybersecurity plan.
First, author Chris Moschovitis walks you through our evolving definitions of privacy, from the ancient world all the way to the General Law on Data Protection (GDPR). He then explains—in friendly, accessible language—how to orient your preexisting cybersecurity program toward privacy, and how to make sure your systems are compliant with current regulations.
This book—a sequel to Moschovitis’ well-received Cybersecurity Program Development for Business—explains which regulations apply in which regions, how they relate to the end goal of privacy, and how to build privacy into both new and existing cybersecurity programs. Keeping up with swiftly changing technology and business landscapes is no easy task. Moschovitis provides down-to-earth, actionable advice on how to avoid dangerous privacy leaks and protect your valuable data assets.
- Learn how to design your cybersecurity program with privacy in mind
- Apply lessons from the GDPR and other landmark laws
- Remain compliant and even get ahead of the curve, as privacy grows from a buzzword to a business must
- Learn how to protect what’s of value to your company and your stakeholders, regardless of business size or industry
- Understand privacy regulations from a business standpoint, including which regulations apply and what they require
- Think through what privacy protections will mean in the post-COVID environment
Whether you’re new to cybersecurity or already have the fundamentals, this book will help you design and build a privacy-centric, regulation-compliant cybersecurity program.
Table of contents
- COVER
- TITLE PAGE
- COPYRIGHT
- FOREWORD
- PREFACE
- ABOUT THE AUTHOR
- ACKNOWLEDGMENTS
- PART ONE: Privacy
- PART TWO: Regulations
-
PART THREE: Privacy and Cybersecurity
- CHAPTER 10: Introduction to Cybersecurity
-
CHAPTER 11: A Cybersecurity Primer
- Cybersecurity Defined
- Confidentiality
- Integrity
- Availability
- Safety
- Measuring Cybersecurity's Success
- Ensuring and Preserving
- Cybersecurity Controls and Defense in Depth
- Defense in Depth
- The Threats
- Threat Agents
- Key Trends Influencing Threat Agents
- The Nature of Hackers
- Attack Process
- Types of Attacks
- A Brief Cyberglossary
- CHAPTER 12: Privacy-Centric Cybersecurity Program Overview
- CHAPTER 13: Privacy by Design Overview
- CHAPTER 14: Cover Your Assets!
- CHAPTER 15: Threat Assessment
- CHAPTER 16: Vulnerabilities
- CHAPTER 17: Environments
- CHAPTER 18: Controls
- CHAPTER 19: Incident Response
- CHAPTER 20: Welcome to the Future! Now, Go Home!
- BIBLIOGRAPHY
- INDEX
- END USER LICENSE AGREEMENT
Product information
- Title: Privacy, Regulations, and Cybersecurity
- Author(s):
- Release date: February 2021
- Publisher(s): Wiley
- ISBN: 9781119658740
You might also like
book
Information Security Handbook
Implement information security effectively as per your organization's needs. About This Book Learn to build your …
book
Information Security Policies, Procedures, and Standards
This book supplies a blueprint on how to develop effective information security policies and procedures. It …
book
Cybersecurity Risk Management
Cybersecurity Risk Management In Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework, veteran …
book
Cybersecurity and Third-Party Risk
STRENGTHEN THE WEAKEST LINKS IN YOUR CYBERSECURITY CHAIN Across the world, the networks of hundreds of …