The True Cost of Information Security Breaches and Cyber Crime

While security product and services vendors tend to overstate breach costs, CFOs and other CxO tend to greatly underestimate these. This book presents a balanced view basd on real life studies and introduces an evaluation model to determine breach costs. It will help you make an informed decision about the scope and extent of the ISMS you need.

Managing Information Security Breaches - Studies from real life, 2nd edition

No matter how well run your ISMS is, one day it might still be affected by breach, be it by employee action or outside action. This book presents real-life case studies on breach management and helps to determine the correct risk profile for your organisation. You will find guidance for effective breach remediation and an invaluable opportunity to learn from others' experiences.

Information Security Breaches: Avoidance and Treatment Based on ISO 27001

ISO 27001 offers 113 controls some of which deal with the specific avoidance and treatment of information security breaches. This book is for those with little time who want to get an overview of these controls and delve into a exemplary real-life breach scenarios and their remediation.

Schauplatz Cyberworld (Available in German only)

Caution nerds: This is for the layman!
Written together with the head of the Cybercrime unit of Austria's Federal Criminal Intelligence Agency, this book presents challenges and chances that the Internet has brought to the individual and the state. Written for a general audience the book includes anecdotes and explanations on Cyberworld life.

Available at your local store