30-day risk-free examination
Secure checkout
Multiple copy discounts

Cybersecurity in Canada: A Guide to Best Practices, Planning, and Management

This text brings together a range of expertise from experienced and knowledgeable specialists, offering unparalleled insight into an evolving and critical area of the law.
Publication Language: English
Book
$90.00
Quantity
In Stock
Published:
ISBN/ISSN: 9780433490555

Product details

With cyberattacks on the rise, there's no question that cybersecurity has become an increasingly important issue for corporate Canada, making it vital that both in-house and outside counsel understand the relevant risks, solutions and best practices. Cybersecurity in Canada: A Guide to Best Practices, Planning, and Management provides that valuable information, guidance, and more. This text brings together a range of expertise from experienced and knowledgeable specialists, offering unparalleled insight into an evolving and critical area of the law. Contributing experts include: Equifax, Toronto Police Services, Privtech, FleishmanHillard and Ridge Canada.

Detailed and insightful information
This progressive and comprehensive handbook contains the information that executives and lawyers need to understand cybersecurity threats and implement preventative and remedial measures. Drawing on their extensive experience in specific areas, the authors provide a discussion and analysis of the background and foundation of the law and offer useful, best practices guidance.

A handy reference for legal professionals who regularly advise on data protection, privacy, cybersecurity and related areas, Cybersecurity in Canada: A Guide to Best Practices, Planning, and Management contains invaluable information related to methods of prevention and management of a cyberattack, including best practices for network security, asset management, assessing threats and vulnerabilities, and other areas of cyber protection.

Readers will benefit from the comprehensive coverage of cybersecurity issues that this book provides, including:

  • Developing and implementing preventative policies and procedures – through procurement, insurance and the selection of vendors
  • Assessing management and supply chain risks
  • Determining corporate governance obligations and the role and duties of the Board of Directors in managing cybersecurity matters, particularly in the event of a breach
  • Understanding the importance of engaging with law enforcement, credit monitoring and minimizing litigation exposure

This unique offering will enable readers to design and execute a cybersecurity management plan to meet their needs.

One-stop shopping
This practical reference featuring input from leading cybersecurity experts will be particularly valuable to professions who manage or advise on issues related to this increasingly important area, including:

  • In-house counsel who provide advice on risks and strategy related to data protection
  • Business executives and office managers who oversee corporate IT systems, risk management, data security and the use of technology in the workplace
  • Corporate, privacy and IT Lawyers who advise clients on cybersecurity best practices, as well as related insurance matters and breach management

Contributors:

  • Kenrick Bagnall – Toronto Police Service
  • Roya Baryole – Lawyer
  • Angela Carmichael – FleishmanHillard
  • Joel Heft – Equifax
  • Greg Markell – Ridge Canada Cyber Solutions Inc.
  • Rosa L. Mauro – Miller Thomson LLP
  • Sumeya Mulla – Waldman & Associates
  • Sarah Nasrullah – Lawyer
  • Fazila Nurani – PRIVATECH
  • Scott Radcliffe – FleishmanHillard
  • Lampros Stougiannos – Miller Thomson LLP

Featured authors

Table of contents

Introduction 
Chapter 1: Overview of the Canadian cybersecurity landscape
Chapter 2: Best practices to implement prior to a breach
Chapter 3: Cloud computing
Chapter 4: Cybersecurity procurement
Chapter 5: Supply chain cybersecurity
Chapter 6: Oversight obligations of the board of directors and management
Chapter 7: Incident management
Chapter 8: Reporting and notification requirements under privacy laws
Chapter 9: Working with law enforcement
Chapter 10: Litigation exposure
Chapter 11: Cyber and privacy insurance
Chapter 12: Credit monitoring
Chapter 13: Communications best practices for a cyber-attack