CONTENTS
Chapter 1: Why Risk does Not Depend on Company Size
Propagation of damage (downstream effects)
Ability to improvise / make quick decisions
Chapter 2: Getting your Risk Profile Right
Chapter 4: General Avoidance and Mitigation Strategies
Introduction – general aspects, avoidance and related ISO27001 controls
Strategies and tactics for treating breaches
Dimensions of treatment / mitigation of information security breaches ...
Get Managing Information Security: Studies from real life now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.