Asia
Select regional store:

We're sorry but that page cannot be found

Please use the links above to find what you were looking for.

You may not have been able to visit your page because of:

   1. An out-of-date bookmark/favourite
   2. A search engine that has an out-of-date listing
   3. A mistyped address
   4. You have no access to this page
   5. The requested resource was not found.
   6. An error has occurred while processing your request.

Are you looking for:

21st Century Chinese Cyberwarfare

Understand China's cyberwarfare

21st Century Chinese Cyberwarfare presents the salient information regarding the use of cyberwarfare doctrine by the People's Republic of China to promote its own interests and enforce its will on other nations. It draws from a combination of business, cultural, historical, and linguistic sources, as well as the author's personal experience, to attempt to explain China to the uninitiated. The author argues that the threat of Chinese cyberwarfare can no longer be ignored, that it is a clear and present danger to organizations of all shapes and sizes, and that it will be economically, societally and culturally damaging for the nations that are targeted.

Product overview

Those that will benefit from the book include: law enforcement agencies, international information security professionals, IT professionals, military professionals, government policy makers and corporate managers. In particular, the book discusses:

  • statistics of the Chinese cyber threat.
  • Chinese government cyber initiatives.
  • understanding the key motivators for government-sponsored cyberwarfare.
  • commercial enterprises as a cyber threat vector.
  • nationalistic threats of Chinese hackers.

Contents

1. The Chinese Cyberthreat

2. Evolution of Chinese Cyberwarfare

3. Chinese Unrestricted Warfare

4. Principles of Warfare – West versus East

5. Nature of Information Warfare

6. Chinese Cyberwarfare Doctrines

7. China's SIGINT Capabilities

8. Chinese IW Capabilities

9. The Chinese IW Organizational Structure

10. Chinese Commercial Enterprises

11. Commercial Objectives of Chinese Cyberattacks

12. Chinese Civilian Hackers

13. The Chinese Cyberthreat: Conclusions

Appendix A: China & the Internet – A history

Appendix B: Chinese Cyberactivism in the Spotlight

Appendix C: China's Informization Campaign

Appendix D: General Wang Pufeng's Challenge of Information Warfare

Appendix E: Chinese Hacker Website Resources

Appendix F: Huawei's Statement on Establishing a Global Cybersecurity Assurance System

About the author

Lieutenant Colonel William Hagestad is recognized internationally as an expert on the Chinese People's Liberation Army and government information warfare. He advises international intelligence organizations, military flag officers, and multi-national commercial enterprises on their internal IT security governance and external security policies. He currently speaks both domestically and internationally on the Chinese cyber threat.

Buy today, in any format. We’ll send you a download link right away or ship it today for swift delivery to your selected destination.

EU General Data Protection Regulation (GDPR) - An Implementation and Compliance Guide, Second Edition

An in-depth guide to the changes your organisation needs to make to comply with the EU GDPR.

 

“It’s practical approach to various aspects of the GDPR will be of value to DP practitioners in organisations of all sizes”

Laura Linkomies

Privacy Laws and Business Report, September 2017

 

The Regulation, which came into force on 25 May 2018, applies to all data controllers and processors that handle EU residents’ personal information.

All organisations – wherever they are in the world – that process the personal data of EU residents must comply with the Regulation. Failure to do so could result in fines of up to €20 million or 4% of annual global turnover – whichever is greater.

This book provides a detailed commentary on the GDPR, explains the changes you need to make to your data protection and information security regimes, and tells you exactly what you need to do to avoid severe financial penalties.

Look inside this book here >>

 

Product overview

Now in its second edition, EU GDPR – An Implementation and Compliance Guide is a clear and comprehensive guide to this new data protection law. It explains the Regulation and sets out the obligations of data processors and controllers in terms you can understand.

Topics covered include:

  • The data protection officer (DPO) role, including whether you need one and what they should do;
  • Risk management and data protection impact assessments (DPIAs), including how, when and why to conduct one;
  • Data subjects’ rights, including consent and the withdrawal of consent, subject access requests (SARs) and how to handle them, and data controllers and processors’ obligations;
  • International data transfers to ‘third countries’, including guidance on adequacy decisions and appropriate safeguards, the EU-US Privacy Shield, international organisations, limited transfers and Cloud providers;
  • How to adjust your data protection processes to comply with the GDPR, and the best way of demonstrating that compliance; and
  • A full index of the Regulation to help you find the articles and stipulations relevant to your organisation.

New in the second edition are:

  • Additional definitions;
  • Further guidance on the DPO role;
  • Greater clarification on data subjects’ rights;
  • Extra guidance on DPIAs;
  • More detailed information on SARs;
  • Clarification of consent and alternative lawful bases for processing personal data; and
  • An implementation FAQ appendix.

The GDPR will have a significant impact on organisations’ data protection regimes around the world. EU GDPR – An Implementation and Compliance Guide shows you what you need to do to comply with the new law.

 

About the authors

IT Governance is a leading global provider of IT governance, risk management and compliance expertise. We pride ourselves on delivering a broad range of integrated, high-quality solutions that meet the real-world needs of our international client base.

Our privacy team, led by Alan Calder, has substantial experience in privacy, data protection, compliance and information security. This practical experience, our understanding of the background and drivers for the GDPR, and the input of our fast-growing team of consultants and trainers are combined in this manual to provide the world’s first guide to implementing the new data protection regulation.

 

Data Flow Mapping Tool

With the Data Flow Mapping Tool, mapping your data flows has never been easier. Create data flow maps – a vital component for GDPR compliance - that can be reviewed, revised and updated when needed, as well as identify weaknesses within your processes.

 Build powerful, intuitive data flow maps

  • Quickly and easily create and edit maps with dynamic drawing tools.
  • Navigate, move, delete and duplicate any element within your map.

 Share and publish data flow reports

  • Generate version-controlled data flow reports in a user-friendly format.
  • Update process maps and details whenever changes are made to a process.

 Ditch complex spreadsheets for an intuitive user interface

  • Print process reports with one click.
  • Easily drag and drop assets around your map.

 Compile a data inventory

  • Log the details of the personal data items involved.
  • Generate an inventory of personal data.

 Specify the lawful basis for processing

  • Highlight the types of personal data being processed.
  • Record what safeguards apply to third-country transfers.

 Collaborate with others

  • Easily review, edit and update maps with multiple people as your organisation evolves.

Key features

  • Create GDPR-compliant data flow maps.
  • Visualise data flows simply and consistently.
  • Improve reporting with a user-friendly dashboard and reports.
  • Keep track of lawful retention periods of your data.
  • Accurately pinpoint which data is being processed, where and how.
  • Quickly locate personal information in response to a data subject access request.

What does the Data Flow Mapping Tool include?

The licence includes:

  • Dedicated support with subscriber access to:
    • Support specialists – schedule a call, chat online or email us;
    • Remote desktop assistance – get secure, hands-on troubleshooting; and
    • Online resources – access our help documentation, tutorials and training video.
  • Access to the latest software:
    • Get instant access to the latest releases and enhancements.

The Data Flow Mapping Tool is offered as an annual renewable licence for one user. An invoice will be raised every year so that you can continue to benefit from updates and unlimited technical support.


Technical specifications

  • Hosted on CyberComply, Vigilant Software’s online cyber security and compliance platform.
  • Accessible via an Internet connection and a compatible browser – the latest version of Chrome, Edge, Firefox or Internet Explorer.
  • Available on an annual subscription basis.
  • Licensed for up to five users.
  • Supported by Microsoft Azure data centres, which have industry-leading security measures and policies.
  • Includes regular updates to content and functionality.

Fulfilment of your software

After you have completed your order, you will receive a sales receipt and an invite email from the CyberComply platform (if you don’t receive these emails, please check your junk folder).

The invite will be sent via noreply@cybercomply.co.uk and it will include a link to access the platform.

Once you have clicked the link, you will be directed to www.cybercomply.co.uk where you will be asked to enter your email and password (a temporary password will be included in the invite email).

You will then have full access to your account.

Once you have accessed your account, you can access our user guides directly from the home screen/dashboard. Alternatively, you can contact support using the icon at the top right of the home screen.

Please note: The invite is valid for 24 hours. Please email support@vigilantsoftware.co.uk should you require a new invite.

50 Top IT Project Management Challenges

A summary of the challenges facing today’s IT project manager

Discussions on project management forums highlight many of the challenges facing a project manager during the course of a project. Unclear requirements, scope creep, and undefined roles are well-trodden issues that can derail a project. Other challenges are less obvious, often more subtle, but equally destructive.

Facing up to the challenges

This book offers a focused and concise summary of 50 challenges facing today’s IT project manager. The authors draw on years of practical experience (rather than classroom theory) to outline these challenges and offer useful tips and advice on how to deal with them.

Challenge and response

Readers of this book will be better equipped to respond to key project management challenges, including

  • Building the team—getting the right resources, matching skills/knowledge, defining roles and responsibilities.
  • Project scope—clarifying assumptions, avoiding ambiguity, getting the time/cost estimates right.
  • Politics—communicating with management and stakeholders, dealing with conflict, handling interference and micro-managing.
  • Risk awareness—identifying inside/outside influences, recognizing inbound and outbound dependencies.
  • Time management—using the right planning tools, balancing work versus meetings.
  • Failure—handling the blame game, protecting the team, rescuing the project.

This book condenses into a handy summary much of the information and advice that can be found in project management-related books and discussion forums. It is an ideal reference for anyone involved in IT project management, from professional service organizations (PSO) and project management offices (PMO) through to active project managers and studying graduates. 

Buy this book and deliver your next project on time, on budget, and to specification

About the authors

Premanand Doraiswamy has over 14 years’ experience working in IT project management with Fortune 500 companies in various industries and is the author of IT Project Management – 30 Steps to Success, also published by IT Governance.

Premi Shiv is a quality assurance specialist with 7 years’ experience in IT processes and management solutions. With an optimistic approach and organizational skills, she has carved a niche in quality assurance.

             
To hear about new books and exclusive offers from IT Governance Publishing, sign up and select "Books" from the New Products options.

This website uses cookies. View our cookie policy
Loading...