Wildy Logo
(020) 7242 5778
enquiries@wildy.com

Book of the Month

Cover of Borderlines in Private Law

Borderlines in Private Law

Edited by: William Day, Julius Grower
Price: £90.00

Lord Denning: Life, Law and Legacy



  


Welcome to Wildys

Watch


NEW EDITION
The Law of Rights of Light 2nd ed



 Jonathan Karas


Offers for Newly Called Barristers & Students

Special Discounts for Newly Called & Students

Read More ...


Secondhand & Out of Print

Browse Secondhand Online

Read More...


Cyber Security and the GDPR


ISBN13: 9781526511638
Publisher: Bloomsbury Professional
Country of Publication: UK
Format: Paperback
Price: Publication Abandoned



Whilst preparing for the GDPR has been a focus for the last two years for all organisations, there is a limited understanding of the link between cyber security and the GDPR. In Part I the book provides the basics of cyber security covering privacy points where relevant and Part II focuses on the GDPR and the crossover with cyber security and also includes case studies.

With many high level data breaches being reported following the introduction of the GDPR and actions taken by supervisory authorities increasing, this book provides IT professionals, DPOs, compliance staff and their legal advisors with the tools and guidance to ensure that they do not fall foul of the GDPR in relation to cyber security.

Contents:
Part I – Introduction to Cyber Security
Chapter 1: Introduction and terminology
Chapter 2: The CIA triad
Chapter 3: Risk analysis and management
Chapter 4: Identity and access control
Chapter 5: Security governance
Chapter 6: Cryptography
Chapter 7: Networking basics
Chapter 8: Malware
Chapter 9: Incident management
Chapter 10: Organisational Cyber security strategy
Chapter 11: Case Study (CISO)
Part II – GDPR and Cyber Security
Chapter 12: The cybersecurity Article 32 'continuum'
Chapter 13: Personal data breach management, Articles 33 and 34.
Chapter 14: Anonymisation and Pseudonymisation
Chapter 15: Cyber insurance
Chapter 16: Dealing with UK ICO / supervisory authority scrutiny
Chapter 17: Supply chain GDPR cyber risk
Chapter 18: Case studies
Part III - Appendices