Cyber Security: Law and Guidance

Cyber Security: Law and Guidance

MBE, Helen Wong

Bloomsbury Publishing PLC

12/2024

896

Dura

9781526528100

Pré-lançamento - envio 15 a 20 dias após a sua edição

Descrição não disponível.
1. Threats
2. Vulnerabilities
3. The Law
4. Defend
4A. The Risk Practitioner's Journey: Risk Aligned Assurance and the Three Lines of Defense
4B. NCSC Research Problem Book - How to Defend
5. Privacy and Security in the Workplace
6. Cyber Security and Physical Buildings
7. Cyber Breach Playbook and Flow Chart
8. The C Suite Perspective on Cyber Risk
9. Cyber Security Checklist and Triage
9A. Checklist for Addressing and Preparing for Cybersecurity Incidents
9B. Cyber Incident Checklist
9C. Security Incident Notification Requirements (UK)
10. Industry Specialists In-Depth Reports
10A. Mobile Payments
10B. Electric Utilities: Critical Infrastructure Protection and Reliability Standards
10C. Securing Critical Manufacturing Sectors from Modern Cyber Threats
10D. UK Financial Services
10E. Cybersecurity for the Energy Sector: Toward Energy 4.0
10F. Aerospace, Defence and Security Sector
10G. Banking in the Emirates - The NBD Way
10H. Healthcare
10I. Medical Devices
11. Social Media and Cyber Security
12. International Law and Interaction between States
13. Security Concerns with The Internet of Things
14. Managing Cyber-Security in an International Financial Institution
15. Employee Liability and Protection
16. Data Security - The New Oil
17. Data Classification
18. Liability Following a Data Breach
19. Criminal Law
20. The Digital Next Way
21A. Product Security and Telecommunications Infrastructure Act 2022
21B. Intelligence and the Monitoring of Everyday Life
22. Cyber Security Law and Legislation: Protecting Data in the UK, EU, and USA: Breachless Liability
23. Data Architecture: Cybersecurity's Silent Partner
24. Mergers and Acquisitions Corporate Due Diligence and Cyber Security Issues
25. Protecting Organisations
26. Public Private Partnerships
27. Cyber Security Disputes
28. The Jello Problem: Key Features of Generative AI That Create Legal Risk
29. Cyber Secret, Life Secrets - On the Verge of Human Science
30. A Plan for the SME
31. Conclusion
Appendices
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
online safety; NFTs; non-fungible tokens; blockchain; cryptocurrency; data protection; computer misuse act; privacy; identity and access management; IAM; electronic security; supply chain management; IT strategy; security management controls; mobile payments; electric utilities; cyber attack; ransomware; social media; cyber crime; Morrisons