Breaches of information security have evolved significantly, with modern methods enabling rapid and damaging incidents that often favor perpetrators over victims. As companies increasingly rely on IT systems, ensuring their safety and security is crucial. This guide addresses the critical task of re-establishing security after a breach has occurred, despite preventive measures. It contextualizes breaches within the framework of ISO27001, which has been instrumental since its inception in the late eighties, providing a structured approach to implementing protective measures for information in all formats. The guide outlines a process for managing severe breaches and aligns it with relevant ISO27001 controls. It offers insights for decision-making and breach classification, along with case studies that illustrate how other organizations responded to breaches. Targeted at CSOs, CISOs, IT Security Managers, CIOs, and CEOs, the guide also aims to demystify this complex subject for non-IT personnel, who may face requests for substantial budgets in response to severe incidents. By making the topic more accessible, it prepares all stakeholders to effectively navigate the challenges posed by information security breaches.
Michael Krausz Books




Die Behandlungsmoeglichkeiten der Schizophrenie haben sich in den letzten Jahren durch neue Therapieformen und -konzepte erfreulich weiterentwickelt. Der Patient soll durch Eigeninitiative und eine auf individuelle Bedurfnisse ausgerichtete Behandlung lernen, mit der Krankheit zu leben und den Therapieerfolg aktiv zu beeinflussen.
Kompendium Sucht
- 160 pages
- 6 hours of reading
Rare Book