To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyses reviews to verify trustworthiness.
First and foremost, if you are interested in learning more about data breaches and how to deal with them, this book is worth your time and money. Inside your first 100 pages you'll receive a thorough understanding of the type of situation a data breach presents, the full ramifications of a quality/poor execution of a breach response, and how you approach a crisis response program/plan of your own. It thoroughly covers how you can set yourself up for success in dealing with these situations in an easily digestible way with excellent commentary and citations. That value alone is worth the purchase in my opinion. It later goes on to walk through specific data breach types and dives deep into the real world examples you've seen in the news. The book is well written, flows well, and makes it easy to keep turning the page. If you're in a position where you need to plan for, influence, or respond to a data breach incident, this is worth it. Great Job to Sherri and her team for delivering this expert knowledge and making it grounded/reinforced with additional material, citations, and value for the reader.
A comprehensive volume on data breaches. Covers both the history and the different areas impacted by the most significant problem domain in information security today. It also provides guidance for how to minimize the possibility of a data breach event, and how to minimize the impact if it does. Do yourself a favor and buy this book (for yourself and your organization).
Absolutely the generally right approach to making interesting and relevant cyber security — but the author shows a lack of focus and the editor reveals an inability to remedy that or make it a priority.
Still I recommend it — and here’s hoping to a quick and improved second edition.