Ebook274 pages6 hours
Managing Catastrophic Loss of Sensitive Data: A Guide for IT and Security Professionals
Rating: 5 out of 5 stars
5/5
()
About this ebook
Offering a structured approach to handling and recovering from a catastrophic data loss, this book will help both technical and non-technical professionals put effective processes in place to secure their business-critical information and provide a roadmap of the appropriate recovery and notification steps when calamity strikes.
- Addresses a very topical subject of great concern to security, general IT and business management
- Provides a step-by-step approach to managing the consequences of and recovering from the loss of sensitive data
- Gathers in a single place all information about this critical issue, including legal, public relations and regulatory issues
Author
Constantine Photopoulos
Constantine Photopoulos is a consultant with extensive security and regulatory compliance experience. He is a partner at the SOX Group (www.soxgroup.com), an IT security consultancy firm in New York City. He is a graduate of the Massachusetts Institute of Technology, with a degree in electrical engineering and computer science.
Related to Managing Catastrophic Loss of Sensitive Data
Related ebooks
Cybersecurity for Executives: A Guide to Protecting Your Business Rating: 0 out of 5 stars0 ratingsEleventh Hour Security+: Exam SY0-201 Study Guide Rating: 0 out of 5 stars0 ratingsInformation Security Best Practices: 205 Basic Rules Rating: 0 out of 5 stars0 ratingsNavigating the Digital Landscape: Fundamentals, Cybersecurity, Emerging Technologies, and Applications Rating: 0 out of 5 stars0 ratingsRMF A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsQualified Security Assessor Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsPrivileged Access Management Tools Standard Requirements Rating: 0 out of 5 stars0 ratingsThirdParty Cybersecurity Risk Management A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsCyber Security Policy Guidebook Rating: 0 out of 5 stars0 ratingsInformation security Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsISO 19770 A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsInformation technology audit The Ultimate Step-By-Step Guide Rating: 0 out of 5 stars0 ratingsPrivileged Access Management A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsEssential Computational Fluid Dynamics Rating: 0 out of 5 stars0 ratingsIT Disaster Recovery Management A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsCybersecurity ISMS Policies And Procedures A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsEncryption Key Management Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsCybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents Rating: 0 out of 5 stars0 ratingsIT Risk Management A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsIT Security Management A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsIT GRC A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsSecurity Monitoring A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsCybersecurity for Small Businesses and Nonprofits Rating: 0 out of 5 stars0 ratingsCyber-attack Vulnerability Management A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsBusiness Continuity Policies A Complete Guide Rating: 0 out of 5 stars0 ratingsConfiguration Management Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsTechno Security's Guide to Securing SCADA: A Comprehensive Handbook On Protecting The Critical Infrastructure Rating: 0 out of 5 stars0 ratingsVMware View Security Essentials Rating: 0 out of 5 stars0 ratingsCybersecurity Maturity Model Certification A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsIT Chargeback A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratings
Security For You
CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsHacking For Dummies Rating: 4 out of 5 stars4/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5CompTIA Security+ Certification Study Guide, Fourth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5IAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsWireless Hacking 101 Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5CompTIA CySA+ Cybersecurity Analyst Certification Passport (Exam CS0-002) Rating: 5 out of 5 stars5/5Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry Rating: 4 out of 5 stars4/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsCompTIA CySA+ Practice Tests: Exam CS0-002 Rating: 0 out of 5 stars0 ratingsCompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsUltimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5Blockchain Basics: A Non-Technical Introduction in 25 Steps Rating: 5 out of 5 stars5/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5
Reviews for Managing Catastrophic Loss of Sensitive Data
Rating: 5 out of 5 stars
5/5
1 rating0 reviews
Book preview
Managing Catastrophic Loss of Sensitive Data - Constantine Photopoulos
Enjoying the preview?
Page 1 of 1