9780983114345-098311434X-Cyber Breach: What if your defenses fail? Designing an exercise to map a ready strategy

Cyber Breach: What if your defenses fail? Designing an exercise to map a ready strategy

ISBN-13: 9780983114345
ISBN-10: 098311434X
Author: Regina Phelps
Publication date: 2016
Publisher: Chandi Media
Format: Paperback 188 pages
FREE US shipping
Buy

From $34.18

Book details

ISBN-13: 9780983114345
ISBN-10: 098311434X
Author: Regina Phelps
Publication date: 2016
Publisher: Chandi Media
Format: Paperback 188 pages

Summary

Cyber Breach: What if your defenses fail? Designing an exercise to map a ready strategy (ISBN-13: 9780983114345 and ISBN-10: 098311434X), written by authors Regina Phelps, was published by Chandi Media in 2016. With an overall rating of 3.8 stars, it's a notable title among other Organizational Learning (Processes & Infrastructure) books. You can easily purchase or rent Cyber Breach: What if your defenses fail? Designing an exercise to map a ready strategy (Paperback) from BooksRun, along with many other new and used Organizational Learning books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $2.82.

Description

Businesses and organizations of all stripes defend against unending attempts to steal their computer data or damage their systems. They pour billions of dollars into those digital defenses. Few, however, have serious plans for how they will respond to the impact of an actual breach. And few stress-test those plans. Such “exercises” force real-time decision-making and actions the same way a fire drill in a large complex might not go well the first time. The problem is that cyber incidents are infinitely more complicated. This book shows Business Continuity Planners, Crisis Managers and their IT counterparts how to stage a cyber incident exercise that will test preparedness, surface unconsidered circumstances, and sharpen the responsiveness of everyone from top executives to line technologists. It focuses on Advanced Tabletop, Functional, and Full-scale exercises. And it covers everything from broad strategies to minute-to-minute decision-making in a “safe” process that brings experience and insight to everyone. It provides very specific step-by-step instructions – starting from the earliest planning to after-action reports. Such “exercises” force real-time decision-making and actions the same way a fire drill in a large complex might not go well the first time. The problem is that cyber incidents are infinitely more complicated. This book shows Business Continuity Planners, Crisis Managers and their IT counterparts how to stage a cyber incident exercise that will test preparedness, surface unconsidered circumstances, and sharpen the responsiveness of everyone from top executives to line technologists. It focuses on Advanced Tabletop, Functional, and Full-scale exercises. And it covers everything from broad strategies to minute-to-minute decision-making in a “safe” process that brings experience and insight to everyone. It provides very specific step-by-step instructions – starting from the earliest planning to after-action reports.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book