Whilst preparing for the GDPR has been a focus for the last two years for all organisations, there is a limited understanding of the link between cyber security and the GDPR.
In Part I the book provides the basics of cyber security covering privacy points where relevant and Part II focuses on the GDPR and the crossover with cyber security and also includes case studies.
With many high level data breaches being reported following the introduction of the GDPR and actions taken by supervisory authorities increasing, this book provides IT professionals, DPOs, compliance staff and their legal advisors with the tools and guidance to ensure that they do not fall foul of the GDPR in relation to cyber security.
Sprache
Verlagsort
Verlagsgruppe
Bloomsbury Publishing PLC
Zielgruppe
Maße
Höhe: 248 mm
Breite: 156 mm
ISBN-13
978-1-5265-1163-8 (9781526511638)
Copyright in bibliographic data is held by Nielsen Book Services Limited or its licensors: all rights reserved.
Schweitzer Klassifikation
Nicholas Soni is a specialist cyber security and data privacy consultant solicitor. He has broad experience, both in-house and from private practice, in advising on data privacy compliance, ICO investigations, data breach preparedness/handling and cybersecurity around the GDPR.
In addition, he has a specialised background in technology and information security, including holding industry-coveted credentials: ISC2 'Certified Information Systems Security Professional' (CISSP); and the IAPP Certified Information Privacy Professional for Europe (CIPP/E).
Part I - Introduction to Cyber Security
Chapter 1: Introduction and terminology
Chapter 2: The CIA triad
Chapter 3: Risk analysis and management
Chapter 4: Identity and access control
Chapter 5: Security governance
Chapter 6: Cryptography
Chapter 7: Networking basics
Chapter 8: Malware
Chapter 9: Incident management
Chapter 10: Organisational Cyber security strategy
Chapter 11: Case Study (CISO)
Part II - GDPR and Cyber Security
Chapter 12: The cybersecurity Article 32 'continuum'
Chapter 13: Personal data breach management, Articles 33 and 34.
Chapter 14: Anonymisation and Pseudonymisation
Chapter 15: Cyber insurance
Chapter 16: Dealing with UK ICO / supervisory authority scrutiny
Chapter 17: Supply chain GDPR cyber risk
Chapter 18: Case studies
Part III - Appendices