Holdings Information
Cybersecurity in Canada : a guide to best practices, planning and management / Imran Ahmad.
Bibliographic Record Display
-
Title:Cybersecurity in Canada : a guide to best practices, planning and management / Imran Ahmad.
-
Author/Creator:Ahmad, Imran, 1977- author.
-
Published/Created:Toronto, Ontario : LexisNexis Canada, 2021.
-
Holdings
Holdings Record Display
-
Location:LAW LIBRARY (level 3)Where is this?
-
Call Number: KE452.C6 A36 2021
-
Number of Items:1
-
Status:c.1 On loan - Due on 09-15-2024
-
Location:LAW LIBRARY (level 3)Where is this?
-
Library of Congress Subjects:Computer crimes--Law and legislation--Canada.
Computer crimes--Canada--Prevention.
Computer security--Law and legislation--Canada.
Data protection--Law and legislation--Canada.
-
Edition:Second edition.
-
Description:xxviii, [216] pages : illustrations (black & white) ; 23 cm
-
Summary:"A handy reference for legal professionals who regularly advise on data protection, privacy, cybersecurity and related areas, Cybersecurity in Canada: A Guide to Best Practices, Planning, and Management contains invaluable information related to methods of prevention and management of a cyberattack, including best practices for network security, asset management, assessing threats and vulnerabilities, and other areas of cyber protection."-- Provided by publisher.
-
Notes:Includes bibliographical references and index.
-
ISBN:9780433499084 (softcover)
0433499087 (softcover)
-
Contents:Overview of the Canadian cybersecurity landscape
Best practices to implement prior to a breach
Cloud computing
Procurement considerations for cybersecurity
Supply chain and cybersecurity
Cybersecurity considerations for business transactions
Oversight obligations of the board of directors and management
Incident management
You've been breached! : technical considerations for incident management
Reporting and notification requirements under privacy laws
Reporting and notification requirements under other regulatory authorities
Public sector cybersecurity
Cross border considerations for managing a cybersecurity icident
Reporting to and working with law enforcement
Legal privilege during breach response
Litigation exposure
Cyber and privacy insurance
Credit monitoring
Communications best practices for cyber incidents.