Your Basket is currently empty

Your Bookshelf is empty!

Your Basket is currently empty

Cyber Security and the GDPR

Media of Cyber Security and the GDPR
See larger image
Published: 16-02-2023
Format: PDF eBook (?)
Edition: 1st
Extent: 304
ISBN: 9781526511652
Imprint: Bloomsbury Professional
RRP: €104.79
Online price : €94.31
Save €10.48 (10%)


Buying pre-order items

Your pre-order item will usually be shipped on the publishing date of the book.


You will receive an email with a download link for the ebook on the publication date.


You will not be charged for pre-ordered books until they are available to be shipped. Pre-ordered ebooks will not be charged for until they are available for download.

Amending or cancelling your order

For orders that have not been shipped you can usually make changes to pre-orders up to 24 hours before the publishing date.

This book is also available in other formats: View formats

Please note that ebooks are subject to tax and the final price may vary depending on your country of residence.

Delivery & Returns

Tell others about this product

Loren Epson

About Cyber Security and the GDPR

Whilst preparing for the GDPR has been a focus for the last two years for all organisations, there is a limited understanding of the link between cyber security and the GDPR.

In Part I the book provides the basics of cyber security covering privacy points where relevant and Part II focuses on the GDPR and the crossover with cyber security and also includes case studies.

With many high level data breaches being reported following the introduction of the GDPR and actions taken by supervisory authorities increasing, this book provides IT professionals, DPOs, compliance staff and their legal advisors with the tools and guidance to ensure that they do not fall foul of the GDPR in relation to cyber security.

Table Of Contents

Part I – Introduction to Cyber Security
Chapter 1: Introduction and terminology
Chapter 2: The CIA triad
Chapter 3: Risk analysis and management
Chapter 4: Identity and access control
Chapter 5: Security governance
Chapter 6: Cryptography
Chapter 7: Networking basics
Chapter 8: Malware
Chapter 9: Incident management
Chapter 10: Organisational Cyber security strategy
Chapter 11: Case Study (CISO)

Part II – GDPR and Cyber Security
Chapter 12: The cybersecurity Article 32 'continuum'
Chapter 13: Personal data breach management, Articles 33 and 34.
Chapter 14: Anonymisation and Pseudonymisation
Chapter 15: Cyber insurance
Chapter 16: Dealing with UK ICO / supervisory authority scrutiny
Chapter 17: Supply chain GDPR cyber risk
Chapter 18: Case studies

Part III - Appendices

Bookmark and Share