Cyber security : law and guidance / Helen Wong MBE.
2025
K564.C6 W66 2025 (Mapit)
Available at Stacks
Formats
| Format | |
|---|---|
| BibTeX | |
| MARCXML | |
| TextMARC | |
| MARC | |
| DublinCore | |
| EndNote | |
| NLM | |
| RefWorks | |
| RIS | |
Author
Title
Cyber security : law and guidance / Helen Wong MBE.
Edition
Second edition.
Imprint
London, UK ; New York, [NY] : Bloomsbury Professional, [2025]
Description
lii, 844 pages : illustrations ; 26 cm
Formatted Contents Note
1. Threats / Helen Wong
2. Vulnerabilities / Helen Wong
3. The Law / Ria Halme
4. Defend. 4A. The Risk Practitioner's Journey: Risk Aligned Assurance and the Three Lines of Defense / Farid Abdelkader
4B. Defend by National Cyber Security Centre
5. Privacy and Security in the Workplace / Ria Halme
6. Cyber Security and Physical Buildings / Helen Wong
7. Cyber Breach Playbook / Helen Wong
8. The C Suite Perspective on Cyber Risk / Klaus Julisch
9A. Checklist for Addressing and Preparing for Cybersecurity Incidents / Helen Wong
9B. Cyber Incident Checklist
9C. Security Incident Notification Requirements (UK)
10. Industry Specialists In-Depth Reports. 10A. Mobile Payments / Rhiannon Lewis
10B. Electric Utilities: Critical Infrastructure Protection and Reliability Standards / E Rudina and S Kort
10C. Securing Critical Manufacturing Sectors from Modern Cyber Threats / Helen Wong
10D. UK Financial Services / Steven Peacock
10E. Cybersecurity for the Energy Sector: Toward Energy 4.0 / Stefano Bracco
10F. Aerospace, Defence and Security Sector / Simon Goldsmith
10G. Banking in the Emirates The NBD Way / Yazad Khandhadia
10H. Healthcare / Helen Wong
10I. Medical Devices / Helen Wong
11. Social Media and Cyber Security / Helen Wong
12. International Law and Interaction between States / Benjamin Ang and Tan E-Reng
13. Security Concerns with The Internet of Things / Kevin Curran
14. Managing Cyber-Security in an International Financial Institution / Cosimo Pacciani
15. Employee Liability and Protection / Sally Penni
16. Data Security The New Oil / Ryan Mackie
17. Data Classification / Reza Alavi
18. Liability Following a Data Breach / Mark Deem and Adelaide Lopez
19. Criminal Law / Jill Lorimer and William Christopher
20. The Digital Next Way / Mark Blackhurst
21A. Product Security and Telecommunications Infrastructure Act 2022 / Helen Wong
21B. Intelligence and the Monitoring of Everyday Life / Victoria Wang and John V. Tucker
22. Cyber Security Law and Legislation: Protecting Data in the UK, EU, and USA: Breachless Liability / David Clarke
23. Data Architecture: Cybersecurity's Silent Partner / Kevin Murphy
24. Mergers and Acquisitions Corporate Due Diligence and Cyber Security Issues / Vijay Rathour
25. Protecting Organisations / Gary Hibberd
26. Public Private Partnerships / E. Rudina
27. Cyber Security Disputes / Ffion Flockhart, Charlie Weston-Simons and Steven Hadwin
28. The Jello Problem: Key Features of Generative AI That Create Legal Risk / David Wakeling and Marcus Turner
29. Cyber Secret, Life Secrets On the Verge of Human Science / Arthur Keleti
30. A Plan for the SME / William McBurrough
31. Conclusion / Helen Wong
Appendices.
2. Vulnerabilities / Helen Wong
3. The Law / Ria Halme
4. Defend. 4A. The Risk Practitioner's Journey: Risk Aligned Assurance and the Three Lines of Defense / Farid Abdelkader
4B. Defend by National Cyber Security Centre
5. Privacy and Security in the Workplace / Ria Halme
6. Cyber Security and Physical Buildings / Helen Wong
7. Cyber Breach Playbook / Helen Wong
8. The C Suite Perspective on Cyber Risk / Klaus Julisch
9A. Checklist for Addressing and Preparing for Cybersecurity Incidents / Helen Wong
9B. Cyber Incident Checklist
9C. Security Incident Notification Requirements (UK)
10. Industry Specialists In-Depth Reports. 10A. Mobile Payments / Rhiannon Lewis
10B. Electric Utilities: Critical Infrastructure Protection and Reliability Standards / E Rudina and S Kort
10C. Securing Critical Manufacturing Sectors from Modern Cyber Threats / Helen Wong
10D. UK Financial Services / Steven Peacock
10E. Cybersecurity for the Energy Sector: Toward Energy 4.0 / Stefano Bracco
10F. Aerospace, Defence and Security Sector / Simon Goldsmith
10G. Banking in the Emirates The NBD Way / Yazad Khandhadia
10H. Healthcare / Helen Wong
10I. Medical Devices / Helen Wong
11. Social Media and Cyber Security / Helen Wong
12. International Law and Interaction between States / Benjamin Ang and Tan E-Reng
13. Security Concerns with The Internet of Things / Kevin Curran
14. Managing Cyber-Security in an International Financial Institution / Cosimo Pacciani
15. Employee Liability and Protection / Sally Penni
16. Data Security The New Oil / Ryan Mackie
17. Data Classification / Reza Alavi
18. Liability Following a Data Breach / Mark Deem and Adelaide Lopez
19. Criminal Law / Jill Lorimer and William Christopher
20. The Digital Next Way / Mark Blackhurst
21A. Product Security and Telecommunications Infrastructure Act 2022 / Helen Wong
21B. Intelligence and the Monitoring of Everyday Life / Victoria Wang and John V. Tucker
22. Cyber Security Law and Legislation: Protecting Data in the UK, EU, and USA: Breachless Liability / David Clarke
23. Data Architecture: Cybersecurity's Silent Partner / Kevin Murphy
24. Mergers and Acquisitions Corporate Due Diligence and Cyber Security Issues / Vijay Rathour
25. Protecting Organisations / Gary Hibberd
26. Public Private Partnerships / E. Rudina
27. Cyber Security Disputes / Ffion Flockhart, Charlie Weston-Simons and Steven Hadwin
28. The Jello Problem: Key Features of Generative AI That Create Legal Risk / David Wakeling and Marcus Turner
29. Cyber Secret, Life Secrets On the Verge of Human Science / Arthur Keleti
30. A Plan for the SME / William McBurrough
31. Conclusion / Helen Wong
Appendices.
Summary
With cyber security law being increasingly contentious, organisations require expert assistance to operationalise matters and uphold a necessarily robust security framework. Invaluable for legal practitioners and organisations, this comprehensive text covers both the law and its practical application, helping to ensure that advisers and organisations have effective policies and procedures in place to deal with cyber security. Topics covered range from privacy and security in the workplace and built environment, to social media and cyber security, and international law and interaction between states. Revised and updated, the Second Edition also benefits readers with coverage of new topics including: - The legal risks of generative AI - Cyber security disputes - Data architecture - Social media and cyber security - Non-fungible tokens (NFTs) as legal property - Cyber security checklist and triage. In addition to contributions from leading international experts, the book also features in-depth reports from industry specialists. Additional context is provided through insights into how the law is developed outside the regulatory frameworks, case law and the role of professional and industry standards for security. This title is included in Bloomsbury Professional's Cyber Law online service.
Bibliography, etc. Note
Includes bibliographical references and index.
Other Editions
Available in Other Form
Online version: Wong, Helen, 1977- Cyber security. Second edition. London ; New York : Bloomsbury Professional, [2025]
Call Number
K564.C6 W66 2025
Language
English
ISBN
9781526528100 hardcover
152652810X hardcover
9781526528124 electronic book
9781526528117 electronic publication
152652810X hardcover
9781526528124 electronic book
9781526528117 electronic publication
Record Appears in