New Search Search History

Holdings Information

    Cybersecurity in Canada : a guide to best practices, planning and management / Imran Ahmad.

    • Title:Cybersecurity in Canada : a guide to best practices, planning and management / Imran Ahmad.
    •    
    • Author/Creator:Ahmad, Imran, 1977- author.
    • Published/Created:Toronto, Ontario : LexisNexis Canada, 2021.
    • Holdings

       
    • Library of Congress Subjects:Computer crimes--Law and legislation--Canada.
      Computer crimes--Canada--Prevention.
      Computer security--Law and legislation--Canada.
      Data protection--Law and legislation--Canada.
    • Edition:Second edition.
    • Description:xxviii, [216] pages : illustrations (black & white) ; 23 cm
    • Summary:"A handy reference for legal professionals who regularly advise on data protection, privacy, cybersecurity and related areas, Cybersecurity in Canada: A Guide to Best Practices, Planning, and Management contains invaluable information related to methods of prevention and management of a cyberattack, including best practices for network security, asset management, assessing threats and vulnerabilities, and other areas of cyber protection."-- Provided by publisher.
    • Notes:Includes bibliographical references and index.
    • ISBN:9780433499084 (softcover)
      0433499087 (softcover)
    • Contents:Overview of the Canadian cybersecurity landscape
      Best practices to implement prior to a breach
      Cloud computing
      Procurement considerations for cybersecurity
      Supply chain and cybersecurity
      Cybersecurity considerations for business transactions
      Oversight obligations of the board of directors and management
      Incident management
      You've been breached! : technical considerations for incident management
      Reporting and notification requirements under privacy laws
      Reporting and notification requirements under other regulatory authorities
      Public sector cybersecurity
      Cross border considerations for managing a cybersecurity icident
      Reporting to and working with law enforcement
      Legal privilege during breach response
      Litigation exposure
      Cyber and privacy insurance
      Credit monitoring
      Communications best practices for cyber incidents.
    Session Timeout
    New Session