Skip to main content
Create Account
About PLI PLUS
Help
Contact Us
Questions? Comments?
Contact us.
Email:
PLUS@pli.edu
Phone:
877.900.5291
PLI.edu
SIGN IN
Search
Browse
All Content
Books
- Answer Books
- Course Handbooks
- Journals
- Treatises
Forms
Transcripts
My Bookshelf
My History
< Back To Results
1 in 1 results
Previous Result
Next Result
Cybersecurity 2014: Managing the Risk
Chair(s):
Lisa J. Sotto
Practice Area:
Corporate & Securities, Intellectual Property, Privacy & Cybersecurity
Published:
Sep 2014
ISBN:
9781402422829
PLI Item #:
51410
CHB Spine #:
G1193
This version is not current.
Click here for the most recent version.
Terms & Connectors
Natural Language
Email
Print
Add To Bookshelf
Permalink
Table of Contents
Related Items
Select All
Front Matter
Faculty Bios
Table of Contents
Chapter 1. Cyber Economic Espionage in Corporate America: What Comes Next? (May 2014)
Chapter 2. 10 Minutes on the Stark Realities of Cybersecurity (April 2013)
Chapter 3. Key Findings from the 2013 US State of Cybercrime Survey (June 2013)
Chapter 4. Executive Order 13636, Improving Critical Infrastructure Cybersecurity (February 12, 2013)
Chapter 5. Framework for Improving Critical Infrastructure Cybersecurity, Version 1.0 (February 12, 2014)
Chapter 6. NIST Roadmap for Improving Critical Infrastructure Cybersecurity (February 12, 2014)
Chapter 7. Summary of the Privacy Engineering Workshop at the National Institute of Standards and Technology (April 9–10, 2014)
Chapter 8. New Cyber Guidance on the Horizon—Be Prepared
Chapter 9. Hunton & Williams LLP Privacy and Information Security Law Blog
Chapter 10. Hunton & Williams LLP Client Alert: Antitrust Guidance on Cybersecurity Reaffirms Old Approach, April 2014
Chapter 11. Hunton & Williams LLP Client Alert: NIST Issues Preliminary Cybersecurity Framework, November 2013
Chapter 12. How to Create Effective Social Media Policies: A Legal Primer (March 19, 2014)
Chapter 13. How to Draft BYOD Policies: A “Bring Your Own Device” Legal Primer (March 26, 2014)
Chapter 14. Data Security Breaches: Are You Prepared? (December 4, 2013)
Chapter 15. Answering Your Cybersecurity Questions: The Need for Continued Action (January 2014)
Chapter 16. Why You Should Adopt the NIST Cybersecurity Framework (May 2014)
Chapter 17. Current Issues in Digital Management for Corporate General Counsel (April 2014)
Chapter 18. A How-To Guide to Information Security Breaches
Index
About Us