This free chapter is an introduction to cybersecurity law from Tari Schreider's new book Cybersecurity Law, Standards and Regulations (2nd Edition)
In today’s litigious business world, cyber-related matters could land you in court. As a computer security professional, you are protecting your data, but are you protecting your company? While you know industry standards and regulations,…
This free chapter is from the new book Cybersecurity Law, Standards and Regulations (2nd Edition) by Tari Schreider
In today’s litigious business world, cyber-relateted matters could land you in court. As a computer security professional, you are protecting your data, but are you protecting your company? While you know industry standards and regulations, you may…
In this chapter you will discover:
• An overview of the concept of an “observation.”
• The primary elements included in the observation as well as its format.
• Fundamental considerations when performing and documenting the observation including the power of one’s influence on the actions being observed, the need for critical thinking, and considerations…
In this chapter you will discover:
• An overview of the concept of an “observation.”
• The primary elements included in the observation as well as its format.
• Fundamental considerations when performing and documenting the observation including the power of one’s influence on the actions being observed, the need for critical thinking, and considerations…
Check out this book review from Security Management Magazine, a publication of ASIS International on Cybersecurity Law, Standards, and Regulations, Second Edition, by Tari Schreider
Reviewed by Ronald L. Mendell, 1 September 2020
Click here for the Print Issue: September 2020
Click here to read the full Cybersecurity Law Book Review.
"Information security generalists who…
This free chapter is from the new book Cybersecurity Law, Standards and Regulations (2nd Edition) by Tari Schreider
In today’s litigious business world, cyber-relateted matters could land you in court. As a computer security professional, you are protecting your data, but are you protecting your company? While you know industry standards and regulations, you may…
What about the legal aspects of cybersecurity? ARE YOU AT RISK?
With critical information assets at risk, your company requires a state-of-the-art cybersecurity program. But how do you achieve the best possible program? Tari Schreider, in Building Effective Cybersecurity Programs: A Security Manager’s Handbook, lays out the step-by-step roadmap to follow as you build or enhance your cybersecurity program. Building Effective Cybersecurity Programs: A Security Manager’s Handbook is organized around the six main steps on the roadmap that will put your cybersecurity program in place:- Design a Cybersecurity Program.
- Establish a Foundation of Governance.
- Build a Threat, Vulnerability Detection, and Intelligence Capability.
- Build a Cyber Risk Management Capability.
- Implement a Defense-in-Depth Strategy.
- Apply Service Management to Cybersecurity Programs.
In today’s litigious business world, cyber-related matters could land you in court. As a computer security professional, you are protecting your data, but are you protecting your company? While you know industry standards and regulations, you may not be a legal expert. Fortunately, in a few hours of reading, rather than months of classroom study, Tari Schreider’s The Manager’s Guide to Cybersecurity Law: Essentials for Today’s Business, lets you integrate legal issues into your security program.
Tari Schreider, a board-certified information security practitioner with a criminal justice administration background, has written a much-needed book that bridges the gap between cybersecurity programs and cybersecurity law. He says, “My nearly 40 years in the fields of cybersecurity, risk management, and disaster recovery have taught me some immutable truths. One of these truths is that failure to consider the law when developing a cybersecurity program results in a protective façade or false sense of security.”
