5
Security Planning and Risk Management
After the last few chapters in which we spent lots of time and effort dealing with the issue of privacy, it’s time to get back to cybersecurity. This time, we are going to move to something called risk management. But, before moving into risk management, we need to understand the basics by learning a bit of the jargon as well as considering what the real menaces to security in an entity can be.
In the next few pages, we will cover topics such as security threats, challenges, and risk management in depth. If you want to know more about the subject, I strongly suggest you obtain a book specifically focusing on the topic.
In this chapter, we will explore the following topics:
- Security threats and challenges ...
Get Cybersecurity and Privacy Law Handbook now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.