Skip to content Skip to sidebar Skip to footer
cybersecurity-program-security-manager-handbook-rothstein-publishing

Building Effective Cybersecurity Programs: A Security Manager’s Handbook

You know by now that your company could not survive without the Internet. Not in today’s market. You are either part of the digital economy or reliant upon it. With critical information assets at risk, your company requires a state-of-the-art cybersecurity program. But how do you achieve the best possible program? Tari Schreider, in Building Effective Cybersecurity Programs: A Security Manager’s Handbook, lays out the step-by-step roadmap to follow as you build or enhance your cybersecurity program. Over 30+ years, Tari Schreider has designed and implemented cybersecurity programs throughout the world, helping hundreds of companies like yours. Building on that experience, he has created a clear roadmap that will allow the process to go more smoothly for you.

Read More

Don’t WannaCry? Cyber Security Starts With Sound Information Security Policies

We all know we need to update our software, backup our critical data, install and maintain antimalware software and firewalls, manage robust contingency and recovery plans, not open funky emails, audit everything, blah blah blah. So what's wrong with us? Why don't we all do these things consistently? I'd like to think that everything we have been lectured, reminded, scolded, chastised, and even ridiculed about in the way of protecting our digital assets is doable and reasonable, but face it – sometimes it's not. Costs, number of hours in the day, distractions, urgent priorities, sleep, other crises, get in the way. Or, to put it simply, we get lazy or "have better things to do."

Read More

Business Continuity Awareness Week 2017 – May 15-19

Preparing for the threat of digital disruption

As the world becomes more and more digital, so do the threats that it faces. Just as we need to protect our organizations from the disruptions that occur in the physical world, we also need to have plans in place to deal with disruptions in the virtual world. As the Business Continuity Institute's latest Cyber Resilience Report showed, two-thirds of organizations experienced at least one cyber security incident during the previous twelve months, and 15% experienced at least ten. No longer can we think: "it will never happen to me." Given the prevalence of the threat, it perhaps no surprise that the BCI's Horizon Scan Report noted that, of all the possible causes of disruption, cyber attacks and data breaches were the top two concerns for business continuity and resilience professionals.

Read More

Your Guide to Cybersecurity Law

In today’s litigious business world, cyber-related matters could land you in court. As a computer security professional, you are protecting your data, but are you protecting your company? While you know industry standards and regulations, you may not be a legal expert. Fortunately, in a few hours of reading, rather than months of classroom study, Tari Schreider’s The Manager’s Guide to Cybersecurity Law: Essentials for Today’s Business, lets you integrate legal issues into your security program. Tari Schreider, a board-certified information security practitioner with a criminal justice administration background, has written a much-needed book that bridges the gap between cybersecurity programs and cybersecurity law. He says, “My nearly 40 years in the fields of cybersecurity, risk management, and disaster recovery have taught me some immutable truths. One of these truths is that failure to consider the law when developing a cybersecurity program results in a protective façade or false sense of security.”

Read More

information-security-policies-made-easy-rothstein-publishing

Information Security Policies Made Easy

Information Security Policies Made Easy is the “gold standard” information security policy template library, with over 1500 pre-written information security policies covering 200+ security topics. Based on the 25 year consulting experience of Charles Cresson Wood, CISSP, CISA, it is the most widely used policy library in the world, with 10,000+ customers in 60 countries. Take the work out of creating, writing, and implementing security policies. Information Security Policies Made Easy has everything you need to build a robust security policy program, delivered by electronic download.

Read More

Information Security Policies Made Easy

Information Security Policies Made Easy

Information Security Policies Made Easy is the “gold standard” information security policy template library, with over 1500 pre-written information security policies covering over 200 security topics. Based on the 25 year consulting experience of Charles Cresson Wood, CISSP, CISA, it is the most widely used policy library in the world, with over 10,000 customers in 60 countries. Take the work out of creating, writing, and implementing security policies. Information Security Policies Made Easy has everything you need to build a robust security policy program.

Read More