Protect business value, stay compliant with global regulations, and meet stakeholder demands with this privacy how-to
Privacy, Regulations, and Cybersecurity: The Essential Business Guide is your guide to understanding what “privacy” really means in a corporate environment: how privacy is different from cybersecurity, why privacy is essential for your business, and how to build privacy protections into your overall cybersecurity plan.
First, author Chris Moschovitis walks you through our evolving definitions of privacy, from the ancient world all the way to the General Law on Data Protection (GDPR). He then explains - in friendly, accessible language - how to orient your preexisting cybersecurity program toward privacy, and how to make sure your systems are compliant with current regulations.
This book - a sequel to Moschovitis’ well-received Cybersecurity Program Development for Business - explains which regulations apply in which regions, how they relate to the end goal of privacy, and how to build privacy into both new and existing cybersecurity programs. Keeping up with swiftly changing technology and business landscapes is no easy task. Moschovitis provides down-to-earth, actionable advice on how to avoid dangerous privacy leaks and protect your valuable data assets.
- Learn how to design your cybersecurity program with privacy in mind
- Apply lessons from the GDPR and other landmark laws
- Remain compliant and even get ahead of the curve, as privacy grows from a buzzword to a business must
- Learn how to protect what’s of value to your company and your stakeholders, regardless of business size or industry
- Understand privacy regulations from a business standpoint, including which regulations apply and what they require
- Think through what privacy protections will mean in the post-COVID environment
Whether you’re new to cybersecurity or already have the fundamentals, this book will help you design and build a privacy-centric, regulation-compliant cybersecurity program.
Table of Contents
Foreword vii
Preface ix
About the Author xiii
Acknowledgments xv
Part One - Privacy 1
Chapter 1 Understanding Privacy 3
Chapter 2 A (Very) Brief History of Privacy 9
Chapter 3 The Legal Case for Privacy (the Finer Print) 21
Part Two - Regulations 45
Chapter 4 Introduction to Regulations 47
Chapter 5 North American Regulations 57
Chapter 6 European Regulations 89
Chapter 7 Asia-Pacific Regulations 119
Chapter 8 African Regulations 145
Chapter 9 South American Regulations 161
Part Three - Privacy and Cybersecurity 171
Chapter 10 Introduction to Cybersecurity 173
Chapter 11 A Cybersecurity Primer 181
Chapter 12 Privacy-Centric Cybersecurity Program Overview 205
Chapter 13 Privacy by Design Overview 221
Chapter 14 Cover Your Assets! 235
Chapter 15 Threat Assessment 261
Chapter 16 Vulnerabilities 275
Chapter 17 Environments 287
Chapter 18 Controls 301
Chapter 19 Incident Response 321
Chapter 20 Welcome to the Future! Now, Go Home! 341
Bibliography 359
Index 377