SALE ON YALE! History • Biography & more... TELL ME MORE

Close Notification

Your cart does not contain any items

Optimal Spending on Cybersecurity Measures

Protecting Health Information

Tara Kissoon

$103

Paperback

Forthcoming
Pre-Order now

QTY:

English
CRC Press
31 March 2025
The aim of this book is to demonstrate the use of business-driven risk assessments within the privacy impact assessment process to meet the requirements of privacy laws.

This book introduces the cyber risk investment model, and the cybersecurity risk management framework used within business-driven risk assessments to meet the intent of Privacy and Data Protection Laws. These can be used by various stakeholders who are involved in the implementation of cybersecurity measures to safeguard sensitive data. This framework facilitates an organization’s risk management decision-making process to demonstrate the mechanisms in place to fund cybersecurity measures to comply with Privacy Laws and demonstrates the application of the process by showcasing six case studies. This book also discusses the elements used within the cybersecurity risk management process and defines a strategic approach to minimize cybersecurity risks.

Features:

Aims to strengthen the reader’s understanding of industry governance, risk and compliance practices Incorporates an innovative approach to assess business risk management Explores the strategic decisions made by organizations when implementing cybersecurity measures and leverages an integrated approach to include risk management elements
By:  
Imprint:   CRC Press
Country of Publication:   United Kingdom
Dimensions:   Height: 234mm,  Width: 156mm, 
ISBN:   9781032863634
ISBN 10:   1032863633
Pages:   352
Publication Date:  
Audience:   Professional and scholarly ,  Undergraduate
Format:   Paperback
Publisher's Status:   Forthcoming
Preface. Chapter 1: Introduction. Chapter 2: Privacy by Design. Chapter 3: Data Protection. Chapter 4: Data Protection Impact Assessment. Chapter 5: Governance. Chapter 6: Cybersecurity Risk Management Framework. Chapter 7: Case Study #1: ACE ABA Software. Chapter 8: Case Study #2: SYNC. Chapter 9: Case Study #3 - Treat Chapter 10: Case Study #4 - Textmagic Chapter 11: Case Study #5 - Wasabi Chapter 12: Case Study #6 – WhatsApp. References. Index.

Sherita-Tara (Tara) Kissoon is multi-certified I.T. Risk & Security Leader with twenty-five years of technology experience, twenty years of experience in the financial services industry. Tara's educational background encompasses a Master of Science (MSc) in Information Security with Upper Class Honours at the University of London, Royal Holloway College, a Master of Business Administration (MBA) with Distinction at the University of Toronto, Rotman School of Management, a Certified Information Systems Auditor (CISA), a Certified Information Systems Security Professional (CISSP) and is licenced within the Life Licenced Qualification Program (LLQP). Details are located @ www.thevirtualmall.ca.

See Also