(020) 7242 5778

Wildy’s Book News

Book News cover photo

Vol 25 No 1 Jan/Feb 2020

Book of the Month

Cover of Gypsy and Traveller Law

Gypsy and Traveller Law

Price: £40.00

Wildy, Simmonds & Hill

Just Published

The Complete List...

Offers for Newly Called Barristers & Students

Special Discounts for Newly Called & Students

Read More ...

Secondhand & Out of Print

Browse Secondhand Online


Cyber Security and the GDPR

ISBN13: 9781526511638
To be Published: August 2021
Publisher: Bloomsbury Professional
Country of Publication: UK
Format: Paperback
Price: £95.00

Whilst preparing for the GDPR has been a focus for the last two years for all organisations, there is a limited understanding of the link between cyber security and the GDPR. In Part I the book provides the basics of cyber security covering privacy points where relevant and Part II focuses on the GDPR and the crossover with cyber security and also includes case studies.

With many high level data breaches being reported following the introduction of the GDPR and actions taken by supervisory authorities increasing, this book provides IT professionals, DPOs, compliance staff and their legal advisors with the tools and guidance to ensure that they do not fall foul of the GDPR in relation to cyber security.

Data Protection, IT and Internet Law
Part I – Introduction to Cyber Security
Chapter 1: Introduction and terminology
Chapter 2: The CIA triad
Chapter 3: Risk analysis and management
Chapter 4: Identity and access control
Chapter 5: Security governance
Chapter 6: Cryptography
Chapter 7: Networking basics
Chapter 8: Malware
Chapter 9: Incident management
Chapter 10: Organisational Cyber security strategy
Chapter 11: Case Study (CISO)
Part II – GDPR and Cyber Security
Chapter 12: The cybersecurity Article 32 'continuum'
Chapter 13: Personal data breach management, Articles 33 and 34.
Chapter 14: Anonymisation and Pseudonymisation
Chapter 15: Cyber insurance
Chapter 16: Dealing with UK ICO / supervisory authority scrutiny
Chapter 17: Supply chain GDPR cyber risk
Chapter 18: Case studies
Part III - Appendices