Catch-up on the latest information security news with our Podcast. Also, keep an eye out for our 'Author Interviews' where we speak with industry experts, covering; InfoSec, Cyber Security, IT, project management, and more.
First in our ITGP Author Interview series - We interview Dr Julie Mehan to discuss her book Artificial Intelligence - Ethical, social, and security impacts for the present and the future
Brexit and Schrems II and the practical implications for the UK and EU data transfers
Understand why cyber security awareness is vital for your professional and personal life
Preston Bukaty is an attorney and consultant. He specializes in data privacy GRC projects, from data inventory audits to gap analyses, contract management, and remediation planning. His compliance background and experience operationalizing compliance in a variety of industries give him a strong understanding of the legal issues presented by international regulatory frameworks. Having conducted more than 3,000 data mapping audits, he also understands the practical realities of project management in operationalizing compliance initiatives. Preston’s legal experience and enthusiasm for technology make him uniquely suited to understanding the business impact of privacy regulations such as the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA). He has advised more than 250 organizations engaged in businesses as varied as SaaS platforms, mobile geolocation applications, GNSS/telematics tools, financial institutions, fleet management software, architectural/engineering design systems, and web hosting. He also teaches certification courses on GDPR compliance and ISO 27001 implementation, and writes on data privacy law topics. Preston lives in Denver, Colorado. Prior to working as a data privacy consultant, he worked for an international GPS software company, advising business areas on compliance issues across 140 countries. Preston holds a juris doctorate from the University of Kansas School of Law, along with a basketball signed by Hall of Fame coach Bill Self. tection in North America
Cyber Security Threats and the risks they pose to SMEs
The world of work is changing. Many employees no longer hold the traditional nine-to-five job. Instead, working time is increasingly flexible. Technology has enabled a rapid rise in the number of remote workers in recent years; the TUC estimates that the number of UK people working from home increased by a fifth in the ten years to 2018, and now stands at around 2.5 million people. This number is expected to continue to rise – as a result of changing attitudes and technological developments – with half the UK workforce expected to be working remotely by 2025.
The increase in commercial aviation and international travel means that pandemics now spread faster than ever before. Seasonal flu, zoonotic contagions such as Ebola, swine flu and avian flu (e.g. H5N1 and H7N9), respiratory syndromes such as SARS and MERS, and now COVID-19 (the 2019 novel coronavirus) have affected millions worldwide. Add the ever-present threat of terrorism and biological warfare, and the possibility of large proportions of your workforce being incapacitated is a lot stronger than you might think. How would your business fare if 50% or more of your employees, including those you rely on to execute your business continuity plan, were afflicted by illness – or worse? Although nothing can be done to prevent pandemics, their impact can be significantly mitigated. Business Continuity and the Pandemic Threat explains how.
Sophie Sayer and Bridget Kenyon are joined by Nicola Day and Camden Woollven to discuss the release of ISO 27001 controls – A guide to implementing and auditing.
A new is book titled, A Guide to the Implementation and Auditing of ISMS Controls based on ISO/IEC 27001. Reasons why Bridget chose us to publish her book are:- because you're quite prominent in the marketplace and I can see what you're aiming to achieve which is, bridging the gap between what people need and what they think they need. If you know what I mean, helping people understand what they actually need and turning that into reality. Where the books are there to support that process and then the consulting is there to facilitate it. This is the book you need when you’ve decided you want to be complaint with or certified to ISO 27001 Implementation guidance, which is easy to understand by people working in business This book fills the gap between the standard and how companies can implement it This book also includes auditing guidance
The modern security practitioner has shifted from a predominantly protective site and assets manager to a leading contributor to overall organisational resilience. Accordingly, The Security Consultant's Handbook sets out a holistic overview of the essential core knowledge, emerging opportunities and approaches to corporate thinking that are increasingly demanded by employers and buyers in the security market. This podcast is 3 minutes long and talks about updating Richards book and his new business venture.
Listen to an exclusive extract from Toomas Viira’s book Lessons Learned: Critical Information Infrastructure Protection – How to protect critical information infrastructure. The extract features Chapter 1: “Critical Infrastructure Services.” It explores what critical infrastructure services are, and how the definition of critical services changes over time. To find out more, order Lessons Learned: Critical Information Infrastructure Protection – How to protect critical information infrastructure from www.itgovernancepublishing.co.uk.
In this exclusive interview, cyber security risk manager and IT auditor Toomas Viira discusses his book Lessons Learned: Critical Information Infrastructure Protection – How to protect critical information infrastructure and gives advice on how to protect your critical information infrastructure. Save 20% on Toomas' book if you order from the ITGP website in February 2019. Visit www.itgovernancepublishing.co.uk to place your order and enter discount code VIIRA20 at the checkout.
In this exclusive interview, risk consultant and cyber security specialist Leron Zinatullin discusses the human aspects of information security and offers his advice for improving the security culture in your organisation. To save 20% on Leron's book, the Psychology of Information Security, order from the ITGP website by 31 January and enter code Jan19 at the checkout. https://www.itgovernancepublishing.co.uk/author/leron-zinatullin
In this podcast we are reading an extract from Alan Field's book, ISO 37001 - An Introduction to Anti-Bribery Management Systems. This extract will take you through the importance of why organisations should implement ISO37001:2016. As an early Christmas gift, receive a 20% discount on all Alan’s products when you enter the discount code FIELD20 at the ITGP checkout. https://www.itgovernancepublishing.co.uk/author/alan-field
In our final interview with Alan Field, we discuss the importance of implementing an EnMS (energy management system) and what steps organisations should take to achieve certification. Receive a 20% discount on all Alan’s products when you enter the discount code FIELD20 at the ITGP checkout. https://www.itgovernancepublishing.co.uk/author/alan-field
For this week’s podcast, Alan Field explains the differences between a gift and a bribe and he also discusses what plans an organisation should have in place for giving and receiving gifts from clients. 20% discount on all Alan’s products For December only, save 20% discount on all Alan’s products when you enter the discount code FIELD20 at the ITGP checkout. https://www.itgovernancepublishing.co.uk/author/alan-field
Our first podcast in December is an interview with anti-bribery expert, Alan Field. In this interview he talks about his career to date and what he has lined up for ITGP in 2019. Save 20% on all of Alan’s products For December only, receive a 20% discount on Alan’s products when you enter the discount code FIELD20 at the ITGP checkout. https://www.itgovernancepublishing.co.uk/author/alan-field
In our final business continuity podcast, Robert reads a sample from his book Validating Your Business Continuity Plan. This extract emphasises the importance of exercising completed BCPs (business continuity plans). Receive a 20% discount on all Robert’s ITGP books This is your last chance to get 20% off Robert’s books. Use discount code BCM20 at the ITGP checkout. Find out here: https://www.itgovernancepublishing.co.uk/author/robert-clark
Robert Clark reads an extract from his book, Business Continuity and the Pandemic Threat in our latest podcast. He discusses the distinct characteristics of a pandemic and how the public often confuses a pandemic for an epidemic. 20% discount on all Robert’s ITGP books For November only, save 20% on Robert’s books when you enter discount code BCM20 at the checkout. https://www.itgovernancepublishing.co.uk/author/robert-clark
In this week's podcast, we’re reading a passage from In Hindsight – A compendium of Business Continuity case studies. The extract shows the smaller threats that could still have a massive impact on your business continuity effectiveness. Save 20% off all of Robert’s ITGP books this November when you use discount code BCM20 at the checkout. Find the link here
In the second episode of Robert Clark's interview, he shares his top tip for organisations trying to create a business continuity plan. We then discuss one of his bestselling titles with ITGP, Business Continuity and the Pandemic Threat. 20% off all Robert’s ITGP books Receive a 20% discount on all of Robert’s ITGP books this November when you use discount code BCM20 at the checkout. https://www.itgovernancepublishing.co.uk/author/robert-clark
Listen to our latest interview with Business Continuity expert and ITGP author, Robert Clark. In the first part of the interview, Robert discusses his career to date and how he began writing books for ITGP. For November, receive 20% discount on Robert's ITGP books when you use the code BCM20 at the checkout. His books can be found here: https://www.itgovernancepublishing.co.uk/product/search?term=Robert+Clark
In this podcast we are releasing an extract from one of our bestselling books, ISO27001/ISO27002:2013 – A Pocket Guide, discussing the seven steps that must be followed when carrying out an ISO 27001 risk assessment. Purchase this book or any other Alan Calder product in October to get a 15% discount when you use code Calder15 at the checkout. https://www.itgovernancepublishing.co.uk/product/iso27001-iso27002-2013
This book extract from the NIST Cybersecurity Framework: A Pocket Guide, will take you through the benefits of implementing the NIST (National Institute of Standards and Technology) CSF (Cybersecurity Framework). Receive a 15% discount on the NIST Cybersecurity Framework: A Pocket Guide when you use the code, CALDER15 at the checkout in October only. https://www.itgovernancepublishing.co.uk/product/nist-cybersecurity-framework
To celebrate the release of our new audiobooks, we’re giving away an exclusive clip from one of our bestselling titles, Nine Steps to Success – An ISO27001:2013 Implementation Overview. Get 15% off this audiobook when you use the code, Calder15 at the checkout. https://www.itgovernancepublishing.co.uk/product/nine-steps-to-success
In this exclusive interview with ITGP founder, Alan Calder, explains how his bestselling pocket guides can help you with your implementation projects, outlines his inspiration for introducing toolkits into the industry and discusses the work that needs to be done for organisations to become GDPR compliant. Get 15% off all of Alan’s ITGP publications in October 2018. Visit his author page to browse the full list and enter CALDER15 at the checkout to claim your discount.
In the final episode of our Security in the Digital World podcast series, we discuss the key messages parents need to get across to their children about the dangers of the Internet. Disclaimer: These are the views of Tom Wood, Selina Daley and Sarah Brown, not of ITGP.
In Graham Day's second interview, he talks about the benefits and the dangers of social media. Save 15% on Graham Day’s book Security in the Digital World. Enter discount code ‘SEPT15’ at the checkout. https://www.itgovernancepublishing.co.uk/product/security-in-the-digital-world
In this interview Graham Day tells us about working with ITGP as his publishers and tells us more about his book.
In this book, Kai Roer presents his Security Culture Framework, and addresses the human and cultural factors in organisational security. The author uses clear, everyday examples and analogies to reveal social and cultural triggers that drive human behaviour. He explains how to manage these threats by implementing an effective framework for an organisational culture, ensuring that your organisation is set up to repel malicious intrusions and threats based on common human vulnerabilities. Create a culture that promotes cyber security within your workplace. ow.ly/4qVr50ieNgr
http://ow.ly/4qVr50ieNgr In this book, Kai Roer presents his Security Culture Framework, and addresses the human and cultural factors in organisational security. The author uses clear, everyday examples and analogies to reveal social and cultural triggers that drive human behaviour. He explains how to manage these threats by implementing an effective framework for an organisational culture, ensuring that your organisation is set up to repel malicious intrusions and threats based on common human vulnerabilities. Create a culture that promotes cyber security within your workplace.
To understand security culture and its constant threats, first we need to look at sociology and work our human behavioural patterns. In this introduction to Kai Roer's book 'Build a Security Culture' we begin with this outlook. itgovernancepublishing.co.uk/product/build-a-security-culture
For the month of August we are kicking off with a live interview with Build a Security Culture author Kai Roer. Back in June we caught up with our author Kair Roer this year at Infosecurity Europe, held at London Olympia. As well as interviewing Kai, we attended some really fantastic industry talks as well as helping out the free ice-cream stand by taking one or two! To purchase Build a Security Culture, a book based on a security framework that comes recommended by ENISA (The European Union Agency for Network and Information Security), please visit the site IT Governance Publishing and use AUG15 for 15% off. https://www.itgovernancepublishing.co.uk/product/build-a-security-culture
In this podcast we introduce an extract from our new audiobook service. The Power Of the Agile Business Analyst by Jamie Lynn Cooke is available to buy now. For more information on our audiobooks please visit our website: www.itgovernancepublishing.co.uk/topic/audiobooks
For the month of July ITGP featured author Jamie Lynn Cook, and interviewed her about the world of project management, and how she got into writing books.
ITGP author of the month: Jamie Lynn Cooke. In this podcast we read an extract from the book 'The Power of the Agile Business Analyst' to introduce the book. itgovernancepublishing.co.uk/product/the-power-of-the-agile-business-analyst-second-edition
This book extract is taken from the new title by Jamie Lynn Cooke, The Power of the Agile Business Analyst, second edition – 30 surprising ways a business analyst can add value to your Agile development team. itgovernancepublishing.co.uk/product/the-power-of-the-agile-business-analyst-second-edition
This book extract is taken from Collaborative Business Design: The Fundamentals, written by our author of the month, Brian Johnson and his co-author Léon-Paul de Rouw.
This book extract is taken from Collaborative Business Design: The Fundamentals, written by our author of the month, Brian Johnson and his co-author Léon-Paul de Rouw. Episode 2 – Understanding IT-driven service requirements: “What is a business service?"
In this podcast Brian Johnson discusses his new book IT for Business (IT4B) - From Genesis to Revolution, a business and IT approach to digital transformation, co-authored with Walter Zondervan and details how the book formed from a Dutch best practice conception on data management and business information practice, into its current international form.
This book extract is taken from Collaborative Business Design: The Fundamentals, written by our author of the month, Brian Johnson and his co-author Léon-Paul de Rouw. Episode 1 – An introduction to IT-driven business services: “The primary focus of this guide is the needs of the business; what information must be collected, how IT is processed, what is automated, can be automated, can never be automated, what is the result we want, how will this new service be paid for and what (if any) income is required from it.”