Cybersecurity Law, Standards and Regulations (Second Edition)
Tari Schreider, Rothstein Publishing, 2020
This book was written to bridge the gap between cyber security and law, providing cyber security practitioners, attorneys and privacy managers with a single and comprehensive and highly detailed guide to cyber security law, international standards and regulations.
Author Tari Schreider is an industry expert with some 40 years of experience in his fields of cyber security, risk management and business continuity. Formerly a distinguished technologist and chief security architect for Hewlett-Packard Enterprise, he has overseen some of the world’s largest information security programmes, preparing organisations to deal with some of the most aggressive and persistent attackers.
“Schreider draws on his vast experience to take the reader on a ‘world tour’ of privacy and data protection laws”
Schreider draws on his vast experience to take the reader on a ‘world tour’ of privacy and data protection laws, providing methodical and practical steps to help all cyber security professionals defend against bad actors, and against the legal actions arising out of a data breach – an important definition to make. Topics examined include an introduction to the foundation of law as it applies to the cyber world, privacy; judicial rulings; cryptography and forensics law; cyber insurance; the legal implications of big data, cloud, data breaches, IoT, ethical hacking and personal digital assistants; as well as future developments in this dynamic arena.
This considerable title also features a series of case studies, guides and measures providing a war-chest of tools and insight to help direct valuable cyber security spend. Some self-study questions add to this book’s appeal as a tool that can be put to immediate use, creating an impressively comprehensive reference to cyber law.
New for this second edition are over 50 cyber law cases and important legal resources; 60 self-study questions; eight cyber law programme models to guide programme design efforts; 10 templates for documenting cyber security law programmes; and the addition of CISO, IoT, Data Broker, Cloud and Event Data recorder cyber security laws.
Readers will also find the supplementary coverage of Act of War clauses to be useful, in addition to new sections on cyber security.
Printed Copy:
Would you also like to receive CIR Magazine in print?
Data Use:
We will also send you our free daily email newsletters and other relevant communications, which you can opt out of at any time. Thank you.
YOU MIGHT ALSO LIKE