New feature: Customize your PLUS research experience with
My Preferences
.
Learn more
.
Skip to main content
Create Account
Training Center
Contact Us
Questions? Comments?
Contact us.
Email:
PLUS@pli.edu
Phone:
877.900.5291
PLI.edu
SIGN IN
Search
Browse
All Content
Books
- Answer Books
- Course Handbooks
- Journals
- Insights
- Treatises
Forms & Checklists
Transcripts
My Bookshelf
My History
< Back To Results
1 in 11580 results
Previous Result
Next Result
Cybersecurity 2016: Managing Cybersecurity Incidents
Chair(s):
Lisa J. Sotto
Practice Area:
Corporate law,
Cybersecurity and data protection,
Information privacy (Cybersecurity and data protection),
Technology
Published:
Sep 2016
i
Other versions can be found in the
Related Items
tab.
ISBN:
9781402427442
PLI Item #:
150565
CHB Spine #:
G1285
This version is not current.
Click here for the most recent version.
Search
Email
Print
Add To Bookshelf
Permalink
Table of Contents
Related Items
Select All
Front Matter
Faculty Bios
Table of Contents
Chapter 1. Federal Bureau of Investigation Public Service Announcements
Chapter 2. Global Economic Crime Survey 2016: US Results
Chapter 3. Getting the Deal Through: Data Protection & Privacy—United States
Chapter 4. Operational Impacts of the General Data Protection Regulation (GDPR) (March 29, 2016)
Chapter 5. Hunton & Williams LLP Privacy & Information Security Law Blog Update: Cybersecurity
Chapter 6. SWIFT Action: Preventing the Next $100 Million Bank Robbery (June 2016)
Chapter 7. Surviving Contact with Reality: Crisis Exercises as a Key Element of Cyber Incident and Crisis Management Response
Chapter 8. If Information Is Available Online and No One Accesses It, Was It a ‘Publication’ for the Purpose of Insurance Coverage for Cybersecurity Loss?
Chapter 9. How to Safeguard Privacy and Data Security in Corporate Transactions (February 22, 2016)
Chapter 10. Building a Winning Security Team from the Top Down
Chapter 11. ISO 27018: The Long-Awaited Cloud Privacy Standard (May 20, 2015)
Chapter 12. On Apple, Encryption, and Privacy (March 1, 2016)
Chapter 13. The Power of ‘Agile’ Security at Dun & Bradstreet
Chapter 14. Achieving Excellence: Cybermetrics —What Directors Need to Know (September 2015)
Chapter 15. Information Sharing and Analysis Organizations: Putting Theory into Practice (April 2016)
Chapter 16. Turnaround and Transformation in Cybersecurity: Key Findings from The Global State of Information Security® Survey 2016
Chapter 17. Cybersecurity Regulations: Some Encouraging Signs for Industry (May 10, 2016)
Index
About Us