The 360-degree guidance needed to manage the business, technology, legal and communications aspects of a data breach.
1. Data breaches defined 2. Impact of a data breach 3. Data breach preparedness 4. Identifying a data breach 5. Managing notification: Who do you tell and when? 6. Investigating a suspected breach 7. Narrowly scoping confirmed breaches
Kevvie is a Partner and National Cyber Response Leader for KPMG Canada and has over 19 years of IT security and forensics experience. Kevvie assists clients in identifying and protecting critical data and proactively preparing for, responding to and recovering from incidents in a manner that minimizes impact and interruption to their business. Kevvie is a globally recognized cyber security and forensics expert who in addition to author of Data Breach Preparation and Response is author of SQL Server Forensic Analysis and contributing author to several security and forensics books. He is an instructor who trains law enforcement agencies on cyber forensic and response practices. His cyber forensics research has been incorporated into formal course curriculum within industry and academic institutions including ISC2 and the University of Abertay Dundee. Credited with advancing the field of digital forensic science, Kevvie is a SANS lethal forensicator and sits on the SANS Advisory Board where he guides the direction of emerging security and forensics research.As a sought after speaker, Kevvie has engaged executive and technical audiences at leading conferences and events including Black Hat, SECTOR, OWASP and the HTCIA and is a resource to the media with features on-air and in print within leading television, news and industry publications including The Business News Network, The Globe and Mail and Information Security and SC magazine.
"The topic is covered beautifully and thoroughly, and approached
from many different angles…Rare are the authors that know how to
explain complex topics in a simple manner and know how to avoid
boring the reader, but these authors belong to that category."
--Help Net Security
"This book provides a thorough grounding in all the aspects of
preparing for, dealing with and mopping up after a data breach and
is likely to present issues you hadn’t considered." --Network
Security
Ask a Question About this Product More... |