An overview of data breaches -- Preparing to develop a computer security incident response plan -- Developing a computer security incident response plan -- Qualifying and investigating a breach -- Containing a breach -- Precisely determining the scope of a breach -- Communicating before, during and after a breach -- Restoring trust and business services after breach -- Preparing for data breach litigation.
Note
Print version record.
Bibliography
Includes bibliographical references and index.
Summary
Provides guidance on how to proactively prepare for and manage the business, technology, legal and communications aspects of a data breach and limit impact.