Skip to content Skip to sidebar Skip to footer
cybersecurity-law-standards-regulations-rothstein-publishing

Free Chapter: Introduction to Cybersecurity Law

This free chapter is an introduction to cybersecurity law from Tari Schreider's new book Cybersecurity Law, Standards and Regulations (2nd Edition) In today’s litigious business world, cyber-related matters could land you in court. As a computer security professional, you are protecting your data, but are you protecting your company? While you know industry standards and regulations,…

Read More

cybersecurity-law-standards-regulations-rothstein-publishing

Free Chapter: Introduction to Cybersecurity Law

This free chapter is from the new book Cybersecurity Law, Standards and Regulations (2nd Edition) by Tari Schreider In today’s litigious business world, cyber-relateted matters could land you in court. As a computer security professional, you are protecting your data, but are you protecting your company? While you know industry standards and regulations, you may…

Read More

Critical Infrastructure Risk Assessment: The Definitive Threat Identification and Threat Reduction Handbook free chapter by rothstein publishing

FREE CHAPTER: Critical Infrastructure Risk Assessment: The Power of the Observation

In this chapter you will discover: • An overview of the concept of an “observation.” • The primary elements included in the observation as well as its format. • Fundamental considerations when performing and documenting the observation including the power of one’s influence on the actions being observed, the need for critical thinking, and considerations…

Read More

Critical Infrastructure Risk Assessment: The Definitive Threat Identification and Threat Reduction Handbook free chapter by rothstein publishing

FREE CHAPTER: Critical Infrastructure Risk Assessment: The Power of the Observation

In this chapter you will discover: • An overview of the concept of an “observation.” • The primary elements included in the observation as well as its format. • Fundamental considerations when performing and documenting the observation including the power of one’s influence on the actions being observed, the need for critical thinking, and considerations…

Read More

information-security-policies-roles-and-responsibilities-made-easy-rothstein-publishing

Information Security Policies, Roles, Responsibilities Made Easy: SPECIAL OFFER

Information Security Policies Made Easy is the “gold standard” information security policy template library, with over 1500 pre-written information security policies covering over 200 security topics. Based on the 25 year consulting experience of Charles Cresson Wood, CISSP, CISA, it is the most widely used policy library in the world, with over 10,000 customers in 60 countries. Take the work out of creating, writing, and implementing security policies.Information Security Roles and Responsibilities Made Easy by security expert Charles Cresson Wood, provides over 70 pre-written job descriptions, mission statements, and organization charts that you can easily customize for your own organization.

Read More