Book description
Is your information security system fit for purpose?
Most businesses are now aware of the importance of information security. However, some organisations struggle to understand what an information security breach would mean from a business management point of view. This can lead to organisations investing in expensive solutions which may not necessarily address their requirements.
This pocket guide uses case studies to illustrate the possible breach scenarios that an organisation can face. It sets out a sensible, realistic assessment of the actual costs of a data or information breach and explains how managers can determine the business damage caused.
This balanced view helps managers and business decision makers to form better assessments of their organisation's information security needs. It also gives readers the knowledge to fend off any security vendors who might try to make sales by spreading panic and exaggerating the consequences of a breach.
With this book's help, you can make sure your information security system is right for your business.
Table of contents
- Foreword
- Preface
- About the Authors
- Acknowledgements
- Contents
- Introduction
- CHAPTER 1: The Daily Breach
- CHAPTER 2: Information Security and Business Risk (1/3)
- CHAPTER 2: Information Security and Business Risk (2/3)
- CHAPTER 2: Information Security and Business Risk (3/3)
- CHAPTER 3: Cost Factors of a Breach (1/4)
- CHAPTER 3: Cost Factors of a Breach (2/4)
- CHAPTER 3: Cost Factors of a Breach (3/4)
- CHAPTER 3: Cost Factors of a Breach (4/4)
- CHAPTER 4: CASE STUDIES (1/5)
- CHAPTER 4: CASE STUDIES (2/5)
- CHAPTER 4: CASE STUDIES (3/5)
- CHAPTER 4: CASE STUDIES (4/5)
- CHAPTER 4: CASE STUDIES (5/5)
- CHAPTER 5: A Brief Checklist
- CHAPTER 6: Conclusion
- ITG Resources
Product information
- Title: The True Cost of Information Security Breaches: A Business Approach
- Author(s):
- Release date: July 2013
- Publisher(s): IT Governance Publishing
- ISBN: 9781849284967
You might also like
book
Once More Unto the Breach: Managing information security in an uncertain world
The role of the information security manager has changed. Have you? The challenges you face as …
book
Managing Information Security Risks: The OCTAVESM Approach
Information security requires far more than the latest tool or technology. Organizations must understand exactly what …
book
Data Protection and the Cloud: Are the risks too great?
Applying the Data Protection Act to the Cloud The UK’s Data Protection Act 1998 (DPA) applies …
book
Comparative Emergency Management
Bringing together the contributions of international experts, this book demonstrates ways to recognize and reduce regional …