• The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk See large image

    The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk (Paperback) By (author) N. k. Mccarthy, By (author) Matthew Todd, By (author) Jeff Klaben

    $39.90 - Save $19.83 33% off - RRP $59.73 Free delivery worldwide Available
    Dispatched in 2 business days
    When will my order arrive?
    Add to basket | Add to wishlist |

    DescriptionBased on proven, rock-solid computer incident response plans The Computer Incident Response Planning Handbook is derived from real-world incident response plans that work and have survived audits and repeated execution during data breaches and due diligence. The book provides an overview of attack and breach types, strategies for assessing an organization, types of plans, and case examples. Tips for keeping data contained, reputations defended, and recognizing and handling the magnitude of any given threat are included. The Computer Incident Response Planning Handbook Contains ready-to-implement incident response plans with guidelines for ongoing due diligence, all based on actual, working, and tested CIRPs Prepares you to immediately build a CIRP for any organization, and keep that plan maintained Explains all the essentials involved in developing both data breach and malware outbreak CIRPs derived from tested incident response plans that have survived the rigors of repeated execution Clearly explains how to minimize the risk of post-event litigation, brand impact, fines and penalties--and how to protect shareholder value Supports corporate compliance with industry standards and requirements like PCI, HIPAA, SOX, CA SB-1386 All plans derived from the book are technology-agnostic Provides supplementary reading to professionals studying for the CERT Certified Computer Security Incident Handler exam or the SANS/GIAC Certified Incident Handler exam (GCIH) In-depth coverage: The Latest Cyber Attacks and How They Are Business Killers; The Nebulous Standard of Cyber Due Diligence &. The New Era of Information Risk; Introduction to Planning & Crisis; A Plan is Preparation Manifested; Getting More Out of Your Plans; Developing a Data Breach CIRP -- Incident Preparation, Plan Execution, and Post-incident Planning; Developing a Malware Outbreak CIRP -- Incident Preparation, Plan Execution, and Post-incident Planning; References


Other books

Other people who viewed this bought
Showing items 1 to 10 of 10

 

Reviews | Bibliographic data
  • Full bibliographic data for The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk

    Title
    The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk
    Authors and contributors
    By (author) N. k. Mccarthy, By (author) Matthew Todd, By (author) Jeff Klaben
    Physical properties
    Format: Paperback
    Number of pages: 240
    Width: 185 mm
    Height: 229 mm
    Thickness: 13 mm
    Weight: 363 g
    Language
    English
    ISBN
    ISBN 13: 9780071790390
    ISBN 10: 007179039X
    Classifications

    BIC E4L: COM
    B&T Book Type: NF
    B&T Modifier: Region of Publication: 01
    B&T Modifier: Subject Development: 20, 10
    Nielsen BookScan Product Class 3: S10.6
    B&T Modifier: Academic Level: 03
    B&T General Subject: 229
    B&T Modifier: Text Format: 01
    B&T Merchandise Category: COM
    B&T Approval Code: A93661400
    Warengruppen-Systematik des deutschen Buchhandels: 26360
    LC subject heading:
    B&T Approval Code: A93661500, A93663050
    BISAC V2.8: COM053000
    DC22: 005.8
    Ingram Subject Code: XE
    Libri: I-XE
    BIC subject category V2: UR
    BISAC V2.8: COM043050
    LC subject heading:
    BISAC V2.8: COM060040
    LC subject heading:
    BISAC V2.8: LAW104000
    LC subject heading: ,
    DC23: 005.8
    BIC subject category V2: UTFB
    LC classification: QA76.9.D314 M36 2012
    LC subject heading: , ,
    Thema V1.0: UR, LNQ, UTFB
    Edition statement
    New ed.
    Illustrations note
    ill
    Publisher
    McGraw-Hill Education - Europe
    Imprint name
    Osborne/McGraw-Hill
    Publication date
    07 August 2012
    Publication City/Country
    New York
    Author Information
    N.K. McCarthy previously managed the Information Security Operations / Threat & Vulnerability Management for a Fortune 50 Corporation for several years. His international staff performed round-the-clock security event monitoring and response. His responsibilities included: security patch remediation, vulnerability scans, and remediation, penetration testing, system configuration monitoring and remediation, maintaining the various Computer Incident Response Plans (CIRP), and an active threat portfolio for key business functions, users, application platforms and persistent vulnerabilities. With a career in over 20 plus years in IT, Mr. McCarthy has held a wide range of roles within IT including systems programming, IT consultant, technical management, and IT sales. He recently retired after 30 plus years as a Marine Corps reservist obtaining the rank of Lieutenant Colonel. His last reserve assignment of five years was with the U.S. Cyber Command. After 9/11, Lt. Col. McCarthy was mobolized and spent almost four years on active duty as an Information Warfare Officer working at the U.S. Strategic Command, the Pentagon, and the National Security Agency (NSA). Mr. McCarthy also has 17 years of experience as a volunteer reserve police officer. In this capacity he was able to attend U.S. DOJ (Law Enforcement Only) training in computer forensics and advanced Internet investigations. He was also certified by FEMA for its Incident Command System (ICS) and the National Incident Management System (NIMS). Mr. McCarthy is currently on the Board of Directors of the San Francisco Bay Area and Silicon Valley chapter of the FBI's Infragard program. Mr. McCarthy has a B.S. degree in Computer Science, an M.B.A. and a CISSP. He is also the CEO of an SDVOB S-corporation with established and developing business in California and Nevada. Dr. Matthew Todd is the Chief Security Officer and Vice President of Risk and Technical Operations for Financial Engines (NASDAQ: FNGN), a financial advisor with more than $47 billion in assets under management. At Financial Engines, he is responsible for security, privacy, business continuity, audit, and risk management for the firm. In addition to his work at Financial Engines, Dr. Todd is the president of the San Francisco Bay Area InfraGard chapter, representing more than 1000 volunteerInfraGard members. He has been a local mentor for the SANS Institute, is a CISM and CIPP, and holds the GSEC certification. He has more than 20 years of experience in the technology space and has been actively involved in information security for the last 15 years. He obtained his Ph.D. from Northwestern University and was a fellow of both the National Science Foundation (U.S.) and the DanishNational Science Foundation. Jeff Klaben is an Adjunct Professor with Santa Clara University's College of Engineering, where he currently teaches Information Assurance and Computer Forensics. He is also a principal with Neohapsis, helping Fortune 500 organizations and leading security technology providers overcome global challenges in technology risk management, competitive strategy, product engineering, compliance, and trusted collaboration to achieve break-through innovation. Previously, Jeff served as Group Director of Technology Risk Management at SanDisk, Chief Information Security Officer for Life Technologies, Engineering Group Director with Cadence Design Systems, and Senior Manager of Enterprise Architecture, IT Security, and Compliance at Applied Materials. He also led product management, professional services delivery, and start-up incubation at Accenture. Jeff is a frequent speaker at industry conferences, and for the past decade, has served on the board of directors of the San Francisco Bay Area InfraGard, a 501(c)(3) nonprofit and public/private partnership dedicated to information sharing for critical infrastructure protection. He assisted the White House as town hall moderator for the rollout of the National Strategy to Secure Cyberspace and was recognized by the U.S. Department of Justice with awards for Dedicated Service and Exceptional Service in the Public Interest. He also received the Belotti Award for Outstanding Business Policy in High Technology Firms from Santa Clara University's Leavey School of Business. Jeff earned an M.B.A. from Santa Clara University, a B.S. in Information Systems from Wright State University, and the credentials of Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), and Certified Information SystemsAuditor (CISA).
    Table of contents
    Introduction: The Latest Cyber Attacks: Business Killers Part 1: The Threat Landscape Ch 1Introduction to Planning & Crisis Ch 2The Nebulous Standard of Cyber Due Diligence & The New Era of Information Risk Part 2: Planning for Crisis Ch 3A Plan is Preparation Manifested Ch 4 Writing Your Computer Incident Response Plan Part 3: Plan Development - Data Breach Ch 5Your Data Breach CIRP - Incident Preparation Ch 6Developing a Data Breach CIRP - Plan Execution Ch 7Your Data Breach CIRP - Post Incident Planning & Maintenance Part 4: Plan Development - Malware Ch 8Your Malware Outbreak CIRP - Incident Preparation Ch 9Your Malware Outbreak CIRP - Plan Execution Ch 10Your Malware Outbreak CIRP - Post Incident Planning Ch 11Closing Thoughts