Warehouse Stock Clearance Sale

Grab a bargain today!


Data Breach Preparation and Response
By

Rating

Product Description
Product Details

Promotional Information

The 360-degree guidance needed to manage the business, technology, legal and communications aspects of a data breach.

Table of Contents

1. Data breaches defined 2. Impact of a data breach 3. Data breach preparedness 4. Identifying a data breach 5. Managing notification: Who do you tell and when? 6. Investigating a suspected breach 7. Narrowly scoping confirmed breaches

About the Author

Kevvie is a Partner and National Cyber Response Leader for KPMG Canada and has over 19 years of IT security and forensics experience. Kevvie assists clients in identifying and protecting critical data and proactively preparing for, responding to and recovering from incidents in a manner that minimizes impact and interruption to their business. Kevvie is a globally recognized cyber security and forensics expert who in addition to author of Data Breach Preparation and Response is author of SQL Server Forensic Analysis and contributing author to several security and forensics books. He is an instructor who trains law enforcement agencies on cyber forensic and response practices. His cyber forensics research has been incorporated into formal course curriculum within industry and academic institutions including ISC2 and the University of Abertay Dundee. Credited with advancing the field of digital forensic science, Kevvie is a SANS lethal forensicator and sits on the SANS Advisory Board where he guides the direction of emerging security and forensics research.As a sought after speaker, Kevvie has engaged executive and technical audiences at leading conferences and events including Black Hat, SECTOR, OWASP and the HTCIA and is a resource to the media with features on-air and in print within leading television, news and industry publications including The Business News Network, The Globe and Mail and Information Security and SC magazine.

Reviews

"The topic is covered beautifully and thoroughly, and approached from many different angles…Rare are the authors that know how to explain complex topics in a simple manner and know how to avoid boring the reader, but these authors belong to that category." --Help Net Security

"This book provides a thorough grounding in all the aspects of preparing for, dealing with and mopping up after a data breach and is likely to present issues you hadn’t considered." --Network Security

Ask a Question About this Product More...
 
Item ships from and is sold by Fishpond World Ltd.

Back to top
We use essential and some optional cookies to provide you the best shopping experience. Visit our cookies policy page for more information.