The Computer Incident Response Planning Handbook and over 2 million other books are available for Amazon Kindle . Learn more


or
Sign in to turn on 1-Click ordering.
Trade in Yours
For a 5.00 Gift Card
Trade in
More Buying Choices
Have one to sell? Sell yours here
Sorry, this item is not available in
Image not available for
Colour:
Image not available

 
Start reading The Computer Incident Response Planning Handbook on your Kindle in under a minute.

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk [Paperback]

N.K. Mccarthy , Matthew Todd , Jeff Klaben
4.0 out of 5 stars  See all reviews (1 customer review)
Price: 36.99 & FREE Delivery in the UK. Details
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Only 3 left in stock (more on the way).
Dispatched from and sold by Amazon. Gift-wrap available.
Want it tomorrow, 12 July? Choose Express delivery at checkout. Details

Formats

Amazon Price New from Used from
Kindle Edition 35.14  
Paperback 36.99  
Trade In this Item for up to 5.00
Trade in The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk for an Amazon Gift Card of up to 5.00, which you can then spend on millions of items across the site. Trade-in values may vary (terms apply). Learn more

Book Description

1 Aug 2012 007179039X 978-0071790390

Uncertainty and risk, meet planning and action.

Reinforce your organization’s security posture using the expert information contained in this tactical guide. The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk shows you how to build and manage successful response plans for the cyber incidents that have become inevitable for organizations of any size. Find out why these plans work. Learn the step-by-step process for developing and managing plans built to address the wide range of issues organizations face in times of crisis.

  • Contains the essentials for developing both data breach and malware outbreak response plans—and best practices for maintaining those plans
  • Features ready-to-implement CIRPs—derived from living incident response plans that have survived the rigors of repeated execution and numerous audits
  • Clearly explains how to minimize the risk of post-event litigation, brand impact, fines and penalties—and how to protect shareholder value
  • Supports corporate compliance with industry standards and requirements, including PCI, HIPAA, SOX, and CA SB-24

Special Offers and Product Promotions

  • Spend 30 and get Norton 360 21.0 - 3 Computers, 1 Year 2014 for 24.99. Here's how (terms and conditions apply)


Product details

  • Paperback: 240 pages
  • Publisher: McGraw-Hill Osborne (1 Aug 2012)
  • Language: English
  • ISBN-10: 007179039X
  • ISBN-13: 978-0071790390
  • Product Dimensions: 23.1 x 18.5 x 1.5 cm
  • Average Customer Review: 4.0 out of 5 stars  See all reviews (1 customer review)
  • Amazon Bestsellers Rank: 559,877 in Books (See Top 100 in Books)
  • See Complete Table of Contents

More About the Author

Discover books, learn about writers, and more.

Product Description

About the Author

N.K. McCarthy previously managed the Information Security Operations / Threat & Vulnerability Management for a Fortune 50 Corporation for several years. His international staff performed round-the-clock security event monitoring and response. His responsibilities included: security patch remediation, vulnerability scans, and remediation, penetration testing, system configuration monitoring and remediation, maintaining the various Computer Incident Response Plans (CIRP), and an active threat portfolio for key business functions, users, application platforms and persistent vulnerabilities.
With a career in over 20 plus years in IT, Mr. McCarthy has held a wide range of roles within IT including systems programming, IT consultant, technical management, and IT sales. He recently retired after 30 plus years as a Marine Corps reservist obtaining the rank of Lieutenant Colonel. His last reserve assignment of five years was with the U.S. Cyber Command. After 9/11, Lt. Col. McCarthy was mobolized and spent almost four years on active duty as an Information Warfare Officer working at the U.S. Strategic Command, the Pentagon, and the National Security Agency (NSA). Mr. McCarthy also has 17 years of experience as a volunteer reserve police officer. In this capacity he was able to attend U.S. DOJ (Law Enforcement Only) training in computer forensics and advanced Internet investigations. He was also certified by FEMA for its Incident Command System (ICS) and the National Incident Management System (NIMS). Mr. McCarthy is currently on the Board of Directors of the San Francisco Bay Area and Silicon Valley chapter of the FBI's Infragard program.
Mr. McCarthy has a B.S. degree in Computer Science, an M.B.A. and a CISSP. He is also the CEO of an SDVOB S-corporation with established and developing business in California and Nevada.



Dr. Matthew Todd is the Chief Security Officer and Vice President of Risk and Technical Operations for Financial Engines (NASDAQ: FNGN), a financial advisor with more than $47 billion in assets under management. At Financial Engines, he is responsible for security, privacy, business continuity, audit, and risk management for the firm.
In addition to his work at Financial Engines, Dr. Todd is the president of the San Francisco Bay Area InfraGard chapter, representing more than 1000 volunteerInfraGard members. He has been a local mentor for the SANS Institute, is a CISM and CIPP, and holds the GSEC certification. He has more than 20 years of experience in the technology space and has been actively involved in information security for the last 15 years. He obtained his Ph.D. from Northwestern University and was a fellow of both the National Science Foundation (U.S.) and the DanishNational Science Foundation.

Jeff Klaben is an Adjunct Professor with Santa Clara University’s College of Engineering, where he currently teaches Information Assurance and Computer Forensics. He is also a principal with Neohapsis, helping Fortune 500 organizations and leading security technology providers overcome global challenges in technology risk management, competitive strategy, product engineering, compliance, and trusted collaboration to achieve break-through innovation. Previously, Jeff served as Group Director of Technology Risk Management at SanDisk, Chief Information Security Officer for Life Technologies, Engineering Group Director with Cadence Design Systems, and Senior Manager of Enterprise Architecture, IT Security, and Compliance at Applied Materials. He also led product management, professional services delivery, and start-up incubation at Accenture.
Jeff is a frequent speaker at industry conferences, and for the past decade, has served on the board of directors of the San Francisco Bay Area InfraGard, a 501(c)(3) nonprofit and public/private partnership dedicated to information sharing for critical infrastructure protection. He assisted the White House as town hall moderator for the rollout of the National Strategy to Secure Cyberspace and was recognized by the U.S. Department of Justice with awards for Dedicated Service and Exceptional Service in the Public Interest. He also received the Belotti Award for Outstanding Business Policy in High Technology Firms from Santa Clara University’s Leavey School of Business. Jeff earned an M.B.A. from Santa Clara University, a B.S. in Information Systems from Wright State University, and the credentials of Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), and Certified Information SystemsAuditor (CISA).

Inside This Book (Learn More)
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index
Search inside this book:

Customer Reviews

5 star
0
3 star
0
2 star
0
1 star
0
4.0 out of 5 stars
4.0 out of 5 stars
Most Helpful Customer Reviews
4.0 out of 5 stars A good accessible read....and useful! 30 Dec 2012
Format:Paperback
With information and digital services as the most valuable of assets, computer incident response planning (CIRP) is increasingly essential and not simply an option any more for organisations. This book sets out to help.

This book is not about security. This book is not about forensics. This one, sitting above a layer, offers a strategic perspective on when to deploy security and forensics capability. The authors offer good motivation to the reader to bring home the message of how important CIRP is, particularly when computer systems are attacked.

The book is divided in two halves. The first three chapters review the threat landscape, talk about standards and crisis planning respectively. I find the first chapter as a very accessible read. The treatment of security-related standards in the following chapter is rather short and sketchy. Chapter 3 then sets the scene in terms of what CIRP is all about.

The second half of the book offers the most value to readers. Over six chapters, the authors describe CIRP templates for two different types of incident including data breaches and malware attacks. The templates are described in very relevant detail and depth, with the thought process underlying it very well explained. I welcome this as this is the bridge between the theory and practice. I hope practitioners use this and repeat the practice for their organisations.

The final chapter offers concluding remarks, which similar to the motivation, is a good apt read for all those in the management who would want to know the business case of investing in CIRP.

I would like to recommend this book to industry professionals who are at the early stages of setting up CIRP - this is the one for you: with good easy language, accompanied by a glossary, this book will be a valuable addition to your book shelves. At 32.79 it is pricey (but then so are cyber attacks!)
Comment | 
Was this review helpful to you?
Most Helpful Customer Reviews on Amazon.com (beta)
Amazon.com: 5.0 out of 5 stars  3 reviews
2 of 2 people found the following review helpful
5.0 out of 5 stars outstanding resource for incident response 17 Sep 2012
By B. Martin - Published on Amazon.com
Format:Paperback|Verified Purchase
After reading through this book I passed it to one of my managers and now his team is using it to build incident response plans to various scenarios. This book really does provide a large portion of turnkey plans for any net defense team. I highly recommend this to those who don't already have well established plans, or perhaps are looking to ensure they are up-to-date and inclusive of all necessary topics.
1 of 1 people found the following review helpful
5.0 out of 5 stars Planning for your crisis 29 Oct 2012
By Christine Sublett - Published on Amazon.com
Format:Paperback
This authors do a fantastic job looking all areas needed to develop an appropriate incident response plan including cyber due diligence, writing your plan, incident preparation, plan execution, and post incident planning and maintenance. The quality of the content makes it simple to utilize and to build your own plans. Better to prepare for the inevitable than to play catch up after the fact!
5.0 out of 5 stars Broad and generic, but well written 19 May 2014
By E. Kilgore - Published on Amazon.com
Format:Paperback|Verified Purchase
This book is well written. It is good at explaining things about an Incident Response Plan that you might overlook (i.e. having executive buy in). It approaches things realistically without getting bogged down with a bunch of fluff or anecdotal knowledge that does not serve a purpose. Short and to the point! I highly recommend this to anyone starting a security program.
Were these reviews helpful?   Let us know
Search Customer Reviews
Only search this product's reviews

Customer Discussions

This product's forum
Discussion Replies Latest Post
No discussions yet

Ask questions, Share opinions, Gain insight
Start a new discussion
Topic:
First post:
Prompts for sign-in
 

Search Customer Discussions
Search all Amazon discussions
   


Look for similar items by category


Feedback