In weniger als einer Minute können Sie mit dem Lesen von The Computer Incident Response Planning Handbook auf Ihrem Kindle beginnen. Sie haben noch keinen Kindle? Hier kaufen Oder fangen Sie mit einer unserer gratis Kindle Lese-Apps sofort an zu lesen.

An Ihren Kindle oder ein anderes Gerät senden

 
 
 

Kostenlos testen

Jetzt kostenlos reinlesen

An Ihren Kindle oder ein anderes Gerät senden

Jeder kann Kindle Bücher lesen  selbst ohne ein Kindle-Gerät  mit der KOSTENFREIEN Kindle App für Smartphones, Tablets und Computer.
The Computer Incident Response Planning Handbook:  Executable Plans for Protecting Information at Risk
 
 

The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk [Kindle Edition]

N.K. McCarthy , Matthew Todd , Jeff Klaben

Kindle-Preis: EUR 32,28 Inkl. MwSt. und kostenloser drahtloser Lieferung über Amazon Whispernet

Weitere Ausgaben

Amazon-Preis Neu ab Gebraucht ab
Kindle Edition EUR 32,28  
Taschenbuch EUR 44,70  

Kunden, die diesen Artikel gekauft haben, kauften auch


Produktbeschreibungen

Kurzbeschreibung

Uncertainty and risk, meet planning and action.

Reinforce your organization’s security posture using the expert information contained in this tactical guide. The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk shows you how to build and manage successful response plans for the cyber incidents that have become inevitable for organizations of any size. Find out why these plans work. Learn the step-by-step process for developing and managing plans built to address the wide range of issues organizations face in times of crisis.

  • Contains the essentials for developing both data breach and malware outbreak response plans—and best practices for maintaining those plans
  • Features ready-to-implement CIRPs—derived from living incident response plans that have survived the rigors of repeated execution and numerous audits
  • Clearly explains how to minimize the risk of post-event litigation, brand impact, fines and penalties—and how to protect shareholder value
  • Supports corporate compliance with industry standards and requirements, including PCI, HIPAA, SOX, and CA SB-24

Über den Autor und weitere Mitwirkende

N.K. McCarthy previously managed the Information Security Operations / Threat & Vulnerability Management for a Fortune 50 Corporation for several years. His international staff performed round-the-clock security event monitoring and response. His responsibilities included: security patch remediation, vulnerability scans, and remediation, penetration testing, system configuration monitoring and remediation, maintaining the various Computer Incident Response Plans (CIRP), and an active threat portfolio for key business functions, users, application platforms and persistent vulnerabilities. With a career in over 20 plus years in IT, Mr. McCarthy has held a wide range of roles within IT including systems programming, IT consultant, technical management, and IT sales. He recently retired after 30 plus years as a Marine Corps reservist obtaining the rank of Lieutenant Colonel. His last reserve assignment of five years was with the U.S. Cyber Command. After 9/11, Lt. Col. McCarthy was mobolized and spent almost four years on active duty as an Information Warfare Officer working at the U.S. Strategic Command, the Pentagon, and the National Security Agency (NSA). Mr. McCarthy also has 17 years of experience as a volunteer reserve police officer. In this capacity he was able to attend U.S. DOJ (Law Enforcement Only) training in computer forensics and advanced Internet investigations. He was also certified by FEMA for its Incident Command System (ICS) and the National Incident Management System (NIMS). Mr. McCarthy is currently on the Board of Directors of the San Francisco Bay Area and Silicon Valley chapter of the FBI's Infragard program. Mr. McCarthy has a B.S. degree in Computer Science, an M.B.A. and a CISSP. He is also the CEO of an SDVOB S-corporation with established and developing business in California and Nevada. Dr. Matthew Todd is the Chief Security Officer and Vice President of Risk and Technical Operations for Financial Engines (NASDAQ: FNGN), a financial advisor with more than $47 billion in assets under management. At Financial Engines, he is responsible for security, privacy, business continuity, audit, and risk management for the firm. In addition to his work at Financial Engines, Dr. Todd is the president of the San Francisco Bay Area InfraGard chapter, representing more than 1000 volunteerInfraGard members. He has been a local mentor for the SANS Institute, is a CISM and CIPP, and holds the GSEC certification. He has more than 20 years of experience in the technology space and has been actively involved in information security for the last 15 years. He obtained his Ph.D. from Northwestern University and was a fellow of both the National Science Foundation (U.S.) and the DanishNational Science Foundation. Jeff Klaben is an Adjunct Professor with Santa Clara University's College of Engineering, where he currently teaches Information Assurance and Computer Forensics. He is also a principal with Neohapsis, helping Fortune 500 organizations and leading security technology providers overcome global challenges in technology risk management, competitive strategy, product engineering, compliance, and trusted collaboration to achieve break-through innovation. Previously, Jeff served as Group Director of Technology Risk Management at SanDisk, Chief Information Security Officer for Life Technologies, Engineering Group Director with Cadence Design Systems, and Senior Manager of Enterprise Architecture, IT Security, and Compliance at Applied Materials. He also led product management, professional services delivery, and start-up incubation at Accenture. Jeff is a frequent speaker at industry conferences, and for the past decade, has served on the board of directors of the San Francisco Bay Area InfraGard, a 501(c)(3) nonprofit and public/private partnership dedicated to information sharing for critical infrastructure protection. He assisted the White House as town hall moderator for the rollout of the National Strategy to Secure Cyberspace and was recognized by the U.S. Department of Justice with awards for Dedicated Service and Exceptional Service in the Public Interest. He also received the Belotti Award for Outstanding Business Policy in High Technology Firms from Santa Clara University's Leavey School of Business. Jeff earned an M.B.A. from Santa Clara University, a B.S. in Information Systems from Wright State University, and the credentials of Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), and Certified Information SystemsAuditor (CISA).

Produktinformation


Mehr über den Autor

Entdecken Sie Bücher, lesen Sie über Autoren und mehr

Kundenrezensionen

Es gibt noch keine Kundenrezensionen auf Amazon.de
5 Sterne
4 Sterne
3 Sterne
2 Sterne
1 Sterne
Die hilfreichsten Kundenrezensionen auf Amazon.com (beta)
Amazon.com: 4.8 von 5 Sternen  5 Rezensionen
2 von 2 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen outstanding resource for incident response 17. September 2012
Von B. Martin - Veröffentlicht auf Amazon.com
Format:Taschenbuch|Verifizierter Kauf
After reading through this book I passed it to one of my managers and now his team is using it to build incident response plans to various scenarios. This book really does provide a large portion of turnkey plans for any net defense team. I highly recommend this to those who don't already have well established plans, or perhaps are looking to ensure they are up-to-date and inclusive of all necessary topics.
1 von 1 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Planning for your crisis 29. Oktober 2012
Von Christine Sublett - Veröffentlicht auf Amazon.com
Format:Taschenbuch
This authors do a fantastic job looking all areas needed to develop an appropriate incident response plan including cyber due diligence, writing your plan, incident preparation, plan execution, and post incident planning and maintenance. The quality of the content makes it simple to utilize and to build your own plans. Better to prepare for the inevitable than to play catch up after the fact!
5.0 von 5 Sternen Broad and generic, but well written 19. Mai 2014
Von E. Kilgore - Veröffentlicht auf Amazon.com
Format:Taschenbuch|Verifizierter Kauf
This book is well written. It is good at explaining things about an Incident Response Plan that you might overlook (i.e. having executive buy in). It approaches things realistically without getting bogged down with a bunch of fluff or anecdotal knowledge that does not serve a purpose. Short and to the point! I highly recommend this to anyone starting a security program.
5.0 von 5 Sternen An actionable handbook on creating an incident response plan 31. August 2014
Von Justin D Henderson - Veröffentlicht auf Amazon.com
Format:Taschenbuch|Verifizierter Kauf
This delivered exactly what the cover promises. This is an easy to follow guide to create a Computer Incident Response Plan that is tailored to your organization. My thanks to the author for this handbook as well as the additional personal references and thoughts.
4.0 von 5 Sternen Very good reference 6. September 2014
Von Bill Wallace - Veröffentlicht auf Amazon.com
Format:Taschenbuch|Verifizierter Kauf
I used this book along with others resources to write the IR plan for my company. Very good reference.
Waren diese Rezensionen hilfreich?   Wir wollen von Ihnen hören.

Kunden diskutieren

Das Forum zu diesem Produkt
Diskussion Antworten Jüngster Beitrag
Noch keine Diskussionen

Fragen stellen, Meinungen austauschen, Einblicke gewinnen
Neue Diskussion starten
Thema:
Erster Beitrag:
Eingabe des Log-ins
 

Kundendiskussionen durchsuchen
Alle Amazon-Diskussionen durchsuchen
   


Ähnliche Artikel finden