Managing Information Security Breaches: Studies from real life, 2nd Edition

Managing Information Security Breaches: Studies from real life

Prepare for a breach with this thought-provoking guide, which details how breaches can be treated and the direction you should take if you’ve been affected.

Spiced with real-life incidents and breaches, this guide will inform a first-line defence for those looking to avoid and/or minimise the destruction caused by a data breach.

What format do I need?

Ready to order
Sub Total: R 0,00 (ZAR)

Other payment options available


A comprehensive guide to managing an information security incident

Aligned with the international information security standard, ISO 27001:2013, this book sets out a strategic framework for handling information security incidents and breaches, including:

  • In-depth guidance for dealing with information security breaches
  • How they can be treated and what ISO 27001 can offer
  • Real-life incidents and breaches that can help you prepare for situations you may face in the future
  • Valuable lessons that your organisation can learn.

Your top priorities after a breach

What should you do first? Who should you go to? How should you handle it?

The author explains what your top priorities should be the moment you realise a breach has occurred, making this book essential reading for IT security managers, chief security officers, chief information officers and chief executive officers.

It will also be of use to personnel in non-IT roles, in an effort to make this subject more comprehensible to those who, in a worst-case scenario, will be on the receiving end of requests for six- or seven-figure excess budgets to cope with severe incidents.

By reading this guide, you’ll learn:

  • How to get your risk profile right
  • The different types of breaches
  • Avoidance and mitigation strategies
  • How small, medium-sized and large companies dealt with data breaches
  • The process of treating a data breach


Understand how to manage information security breaches with this thought-provoking guide.

Buy today.


About the author

Michael Krausz studied physics, computer science and law at the Vienna University of Technology, Vienna University and Webster University. Over the last 20 years he has become an accomplished professional investigator, IT expert and ISO 27001 auditor, investigating over a hundred information security breaches. He has delivered over 5,000 hours of professional and academic training, and has provided consulting or investigation services in 21 countries.


Additional information

Click here to view a sample of the book >>


Author: Michael Krausz
Publisher: IT Governance Publishing
ISBN: 9781849285957
Pages: 210
Format: Softcover
Published date: 29 January 2015
Availability: Always Available

Product Rating: (0.00)   # of Ratings: 0   (Only registered customers can rate)

There are no comments for this product.