Text
Cyber breach response that actually works: organizational approach to managing residual risk
Table of Contents
Foreword xxiii
Introduction xxv
Chapter 1 Understanding the Bigger Picture 1
Chapter 2 Building a Cybersecurity Incident Response Team 51
Chapter 3 Technology Considerations in Cyber Breach Investigations 97
Chapter 4 Crafting an Incident Response Plan 143
Chapter 5 Investigating and Remediating Cyber Breaches 195
Chapter 6 Legal and Regulatory Considerations in Cyber Breach Response 243
Summary 277
Notes 278
Index 281
No other version available