|Title:||Personal Information Security & Systems Architecture: Techniques for PII Management in a Business|
|Publisher:||Aykira Pty Ltd|
|Publication date:||September 14, 2018|
|Number of pages:||0|
From the software engineer to product manager, CTO, and CEO and the Board, all have a role in implementing appropriate personal information security. Securing such personal information on computers is where this book comes into its own.
Globally, personal data breaches are at record levels. In 2017 identity theft, and related fraud cost $16 billion, affecting 6.7 million people, up 8% from 2016 (Javelin Strategy & Research, 2018). Generic cyber-attacks in APAC alone has cost an estimated $1.7 trillion in 2017 (Yu, 2018).
The amount stolen is staggering; it's a multi-billion dollar "underground business" affecting everyone. Governments, given such breaches and rampant wholesale data collection, are quickly creating robust legislation.
Businesses, when faced with having to meet such evolving regulatory requirements, find it hard working out what to do; this is where this book excels. It explains what to focus on, when and why. Detailed are security, architectural and technical best practices based on real-world experience, combined with a PII focus - giving confidence that sensitive information is handled correctly.
With this book, you will learn how to discover, classify and value personal information in your business systems. Then it will guide you in determining what security controls are appropriate to secure the personal information and what technology you need to be well placed to follow data processing regulations.