Top content provider of cybersecurity, crisis management & business continuity books & products
Stay In Touch with Our Updates
What’s new in INFORMATION SECURITY POLICIES MADE EASY Version 14? – Security Policy Library Update for the Common Policy Library (CPL) – Updated Security Policy Mappings – 39 Updated “Ready-to-Go” Sample Security Policy Templates – Additional New Compliance Documents – 60+ New Information Security Policies
In this chapter you will discover: • An overview of the concept of an “observation.” • The primary elements included in the observation as well as its format. • Fundamental considerations when performing and documenting the observation including the power of one’s influence on the actions being observed, the need for critical thinking, and considerations on how the observation supports the risk assessment.
The COVID-19 pandemic was not a “black swan” (catastrophic event that came out of the blue and no one saw coming), it was a “gray rhino” which had long been predicted but leadership everywhere overlooked. As we move forward from the pandemic to new challenges, how do we better ensure we have our eyes open so the next crisis doesn’t hit us unaware?
Critical Infrastructure Risk Assessment: The Definitive Threat Identification and Threat Reduction Handbook
WHAT DEVASTATING THREATS DOES YOUR CRITICAL FACILITY FACE? WHAT CAN YOU DO TO ADDRESS THOSE RISKS? Critical Infrastructure Risk Assessment is your hands-on, step-by-step guide to understanding, prioritizing, and mitigating, risk. Ernie Hayden guides you with tools, examples, processes plus a real-world example risk assessment report. You will learn what constitutes critical infrastructure and risk,
This free chapter is from the new book Cybersecurity Law, Standards and Regulations (2nd Edition) by Tari Schreider In today’s litigious business world, cyber-relateted matters could land you in court. As a computer security professional, you are protecting your data, but are you protecting your company? While you know industry standards and regulations, you may
Learn from the Masters of Root Cause Analysis! Master Cause Analysis with this comprehensive 3-book cause analysis library, and now save 25%!Chester Rowe, Fred Forck and ABS Consulting cover all of the Cause Analysis bases in this 3-book set, regularly $382.97, get all three for $287.99. Here are three industry-defining books for YOUR Cause Analysis Library!
This free excerpt from the new book Building an Effective Cybersecurity Program, 2nd Edition, by Tari Schreider C|CISO, CRISC, ITIL® Foundation, MCRP, SSCP will help you to begin Building YOUR Cyber Threat, Vulnerability Detection, and Intelligence Capability. This chapter will help you to: Understand the relationship between threats and vulnerabilities. Understand how to identify and
Are you interested in getting published? Rothstein Publishing publishes and distributes industry-leading, current content digitally and in print globally. Our authors are globally recognized, and many are uniquely distinguished among international thought leaders as founders of their respective industries. Most have also been key participants in developing industry standards and best practices. We would like