Home Page Icon
Home Page
Table of Contents for
Half-Title Page
Close
Half-Title Page
by Sherri Davidoff
Data Breaches: Crisis and Opportunity
Cover Page
About This eBook
Half-Title Page
Title Page
Copyright Page
Dedication Page
Contents
Preface
Who Should Read This Book?
How This Book Is Organized
Stay Up-to-Date
Acknowledgments
About the Author
Chapter 1. Dark Matters
1.1 Dark Breaches
1.2 Skewed Statistics
1.3 Why Report?
1.4 What’s Left Unsaid
Chapter 2. Hazardous Material
The Theft
Triage
Involving Law Enforcement
The First Customer Breach Notification
Downplaying Risk
Media Manipulation
Skeletons in the Closet
What We Can Learn
2.1 Data Is the New Oil
2.2 The Five Data Breach Risk Factors
2.3 The Demand for Data
2.4 Anonymization and Renonymization
2.5 Follow the Data
2.6 Reducing Risk
2.7 Conclusion
Chapter 3. Crisis Management
3.1 Crisis and Opportunity
3.2 Crisis Communications, or Communications Crisis?
3.3 Equifax
3.4 Conclusion
Chapter 4. Managing DRAMA
4.1 The Birth of Data Breaches
4.2 A Smoldering Crisis
4.3 Prodromal Phase
4.4 Acute Phase
4.5 Reducing Harm
4.6 Chronic Phase
4.7 Resolution Phase
4.8 Before a Breach
4.9 Conclusion
Chapter 5. Stolen Data
5.1 Leveraging Breached Data
5.2 Fraud
5.3 Sale
5.4 The Goods
5.5 Conclusion
Chapter 6. Payment Card Breaches
6.1 The Greatest Payment Card Scam of All
6.2 Impact of a Breach
6.3 Placing Blame
6.4 Self-Regulation
6.5 TJX Breach
6.6 The Heartland Breach
6.7 PCI and Data Breach Investigations
6.8 Conclusion
Chapter 7. Retailgeddon
7.1 Accident Analysis
7.2 An Ounce of Prevention
7.3 Target’s Response
7.4 Ripple Effects
7.5 Chip and Scam
7.6 Legislation and Standards
7.7 Conclusion
Chapter 8. Supply Chain Risks
8.1 Service Provider Access
8.2 Technology Supply Chain Risks
8.3 Cyber Arsenals
8.4 Conclusion
Chapter 9. Health Data Breaches
9.1 The Public vs. the Patient
9.2 Bulls-Eye on Healthcare
9.3 HIPAA: Momentous and Flawed
9.4 Escape from HIPAA
9.5 Health Breach Epidemic
9.6 After a Breach
9.7 Conclusion
Chapter 10. Exposure and Weaponization
10.1 Exposure Breaches
10.2 Response
10.3 MegaLeaks
10.4 Conclusion
Chapter 11. Extortion
11.1 Epidemic
11.2 Denial Extortion
11.3 Exposure Extortion
11.4 Faux Extortion
11.5 Conclusion
Chapter 12. Cyber Insurance
12.1 Growth of Cyber Insurance
12.2 Industry Challenges
12.3 Types of Coverage
12.4 Commercial Off-the-Shelf Breach Response
12.5 How to Pick the Right Cyber Insurance
12.6 Leverage Your Cyber Insurance
12.7 Conclusion
Chapter 13. Cloud Breaches
13.1 Risks of the Cloud
13.2 Visibility
13.3 Intercepted
13.4 Conclusion
Afterword
Index
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
About This eBook
Next
Next Chapter
Title Page
Data Breaches
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset