Skip to content Skip to sidebar Skip to footer
Critical Infrastructure Risk Assessment: The Definitive Threat Identification and Threat Reduction Handbook free chapter by rothstein publishing

Critical Infrastructure Risk Assessment: The Definitive Threat Identification and Threat Reduction Handbook

WHAT DEVASTATING THREATS DOES YOUR CRITICAL FACILITY FACE? WHAT CAN YOU DO TO ADDRESS THOSE RISKS? Critical Infrastructure Risk Assessment is your hands-on, step-by-step guide to understanding, prioritizing, and mitigating, risk. Ernie Hayden guides you with tools, examples, processes plus a real-world example risk assessment report. You will learn what constitutes critical infrastructure and risk,…

Read More

cybersecurity-law-standards-regulations-rothstein-publishing

Cybersecurity Law, International Standards & Regulations – Up to the Minute

Cybersecurity practitioners, attorneys and privacy managers now have a single, comprehensive resource on cybersecurity law plus the latest international standards and regulations. "This book bridges the gap between cybersecurity and legal and gives you the proper tools and common language to communicate with your board effectively so that money spent on cybersecurity is spent wisely."…

Read More

building-effective-cybersecurity-program-rothstein-publishing

New Book: Building an Effective Cybersecurity Program 2nd Edition by Tari Schreider

You know by now that your company could not survive without the Internet. Not in today’s market. You are either part of the digital economy or reliant upon it. With critical information assets at risk, your company requires a state-of-the-art cybersecurity program. But how do you achieve the best possible program? Tari Schreider, in Building Effective…

Read More

building-effective-cybersecurity-program-rothstein-publishing

New Book: Building an Effective Cybersecurity Program 2nd Edition by Tari Schreider

You know by now that your company could not survive without the Internet. Not in today’s market. You are either part of the digital economy or reliant upon it. With critical information assets at risk, your company requires a state-of-the-art cybersecurity program. But how do you achieve the best possible program? Tari Schreider, in Building Effective…

Read More