Charlie Maclean-Bristol looks at the risk of a cyber-attack and the importance of reviewing your vulnerability to water, wastewater and electricity loss.
Read moreFree Chapter: Introduction to Cybersecurity Law
This free chapter is from the new book Cybersecurity Law, Standards and Regulations (2nd Edition) by Tari Schreider In today’s litigious business world, cyber-relateted matters could land you in court. As a computer security professional, you are...
Read moreFree Excerpt: Building a Cyber Threat, Vulnerability Detection, and Intelligence Capability
This free excerpt from the new book Building an Effective Cybersecurity Program, 2nd Edition, by Tari Schreider C|CISO, CRISC, ITIL® Foundation, MCRP, SSCP will help you to begin Building YOUR Cyber Threat, Vulnerability Detection, and...
Read moreInformation Security Policies Made Easy – Version 14 NOW AVAILABLE
What’s new in INFORMATION SECURITY POLICIES MADE EASY Version 14? – Security Policy Library Update for the Common Policy Library (CPL) – Updated Security Policy Mappings – 39 Updated “Ready-to-Go” Sample...
Read moreFREE CHAPTER: Critical Infrastructure Risk Assessment: The Power of the Observation
In this chapter you will discover: • An overview of the concept of an “observation.” • The primary elements included in the observation as well as its format. • Fundamental considerations when performing and documenting the observation including...
Read moreFREE CHAPTER: Critical Infrastructure Risk Assessment: The Power of the Observation
In this chapter you will discover: • An overview of the concept of an “observation.” • The primary elements included in the observation as well as its format. • Fundamental considerations when performing and documenting the observation including...
Read moreInformation Security Policies Made Easy – Version 14 NOW AVAILABLE
What’s new in INFORMATION SECURITY POLICIES MADE EASY Version 14? – Security Policy Library Update for the Common Policy Library (CPL) – Updated Security Policy Mappings – 39 Updated “Ready-to-Go” Sample...
Read moreBook Review: Cybersecurity Law, Standards, and Regulations, Second Edition
Check out this book review from Security Management Magazine, a publication of ASIS International Cybersecurity Law, Standards, and Regulations, Second Edition, by Tari Schreider Reviewed by Ronald L. Mendell, 1 September 2020 Click here for the...
Read moreInformation Security Policies Made Easy – Version 14 NOW AVAILABLE
What’s new in INFORMATION SECURITY POLICIES MADE EASY Version 14? – Security Policy Library Update for the Common Policy Library (CPL) – Updated Security Policy Mappings – 39 Updated “Ready-to-Go” Sample...
Read moreFree Chapter: Introduction to Cybersecurity Law
This free chapter is from the new book Cybersecurity Law, Standards and Regulations (2nd Edition) by Tari Schreider In today’s litigious business world, cyber-relateted matters could land you in court. As a computer security professional, you are...
Read moreRansomware Attacks in the Legal Profession
Here are the most essential actions to take to protect your organization from the effects of a ransomware attack.
Read moreCybersecurity Law, International Standards and Regulations – Up to the Minute
Cybersecurity practitioners, attorneys and privacy managers now have a single, comprehensive resource on cybersecurity law plus the latest international standards and regulations. “This book bridges the gap between cybersecurity and legal...
Read more