BOOK: Cybersecurity Law, Standards and Regulations (2nd Ed) by Tari Schreider

Cybersecurity Law, Standards and Regulations (Second Edition)
Tari Schreider, Rothstein Publishing, 2020

This book was written to bridge the gap between cyber security and law, providing cyber security practitioners, attorneys and privacy managers with a single and comprehensive and highly detailed guide to cyber security law, international standards and regulations.

Author Tari Schreider is an industry expert with some 40 years of experience in his fields of cyber security, risk management and business continuity. Formerly a distinguished technologist and chief security architect for Hewlett-Packard Enterprise, he has overseen some of the world’s largest information security programmes, preparing organisations to deal with some of the most aggressive and persistent attackers.

“Schreider draws on his vast experience to take the reader on a ‘world tour’ of privacy and data protection laws”

Schreider draws on his vast experience to take the reader on a ‘world tour’ of privacy and data protection laws, providing methodical and practical steps to help all cyber security professionals defend against bad actors, and against the legal actions arising out of a data breach – an important definition to make. Topics examined include an introduction to the foundation of law as it applies to the cyber world, privacy; judicial rulings; cryptography and forensics law; cyber insurance; the legal implications of big data, cloud, data breaches, IoT, ethical hacking and personal digital assistants; as well as future developments in this dynamic arena.

This considerable title also features a series of case studies, guides and measures providing a war-chest of tools and insight to help direct valuable cyber security spend. Some self-study questions add to this book’s appeal as a tool that can be put to immediate use, creating an impressively comprehensive reference to cyber law.

New for this second edition are over 50 cyber law cases and important legal resources; 60 self-study questions; eight cyber law programme models to guide programme design efforts; 10 templates for documenting cyber security law programmes; and the addition of CISO, IoT, Data Broker, Cloud and Event Data recorder cyber security laws.

Readers will also find the supplementary coverage of Act of War clauses to be useful, in addition to new sections on cyber security.

    Share Story:

Recent Stories

Financial institutions were early adopters of cyber security and insurance. Are they still on top of the game?
Managing huge amounts of sensitive data online makes financial institutions a prime target for hackers. As such, the sector was an early cohort for insurers in creating cyber cover. Since then, the market has evolved almost beyond recognition. It continues to challenge itself to this day, complying with rigorous regulatory demands and implementing avant-garde enhancements to keep abreast of the ever-changing risks. Published June 2021

Manufacturing: An industry at risk amid great technological change
Of the many sectors of business, manufacturing companies are among the most at risk from cyber threats. How has the sector evolved to make it so vulnerable and what does the task of managing cyber exposure in a manufacturing company look like? CIR’s latest podcast with Tokio Marine HCC sought to answer all these questions and more. Published April 2021