CONTENTS
Chapter 1: Why Risk does Not Depend on Company Size
Propagation of damage (downstream effects)
Ability to improvise / make quick decisions
Chapter 2: Getting your Risk Profile Right
Chapter 4: General Avoidance and Mitigation Strategies
Introduction – general aspects / avoidance and related
Strategies and tactics for treating breaches
Dimensions of treatment / mitigation of information security breaches ...
Get Managing Information Security Breaches: Studies from Real Life now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.