Information security governance simplified : from the boardroom to the keyboard / / Todd Fitzgerald ; foreword by Tom Peltier.

"Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks t...

Full description

Saved in:
Bibliographic Details
:
TeilnehmendeR:
Year of Publication:2012
Language:English
Online Access:
Physical Description:xxviii, 381 p. :; ill., port.
Notes:"An Auerbach book."
Tags: Add Tag
No Tags, Be the first to tag this record!
id 500826929
ctrlnum (MiAaPQ)500826929
(Au-PeEL)EBL826929
(CaPaEBR)ebr10517983
(CaONFJC)MIL352549
(OCoLC)785337393
collection bib_alma
record_format marc
spelling Fitzgerald, Todd.
Information security governance simplified [electronic resource] : from the boardroom to the keyboard / Todd Fitzgerald ; foreword by Tom Peltier.
Boca Raton [Fla.] : CRC Press, 2012.
xxviii, 381 p. : ill., port.
"An Auerbach book."
Includes bibliographical references and index.
"Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure.Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations"-- Provided by publisher.
Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.
Information networks Security measures.
Information resources management.
Business intelligence.
Information technology Security measures.
Electronic books.
ProQuest (Firm)
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=826929 Click to View
language English
format Electronic
eBook
author Fitzgerald, Todd.
spellingShingle Fitzgerald, Todd.
Information security governance simplified from the boardroom to the keyboard /
author_facet Fitzgerald, Todd.
ProQuest (Firm)
ProQuest (Firm)
author_variant t f tf
author2 ProQuest (Firm)
author2_role TeilnehmendeR
author_corporate ProQuest (Firm)
author_sort Fitzgerald, Todd.
title Information security governance simplified from the boardroom to the keyboard /
title_sub from the boardroom to the keyboard /
title_full Information security governance simplified [electronic resource] : from the boardroom to the keyboard / Todd Fitzgerald ; foreword by Tom Peltier.
title_fullStr Information security governance simplified [electronic resource] : from the boardroom to the keyboard / Todd Fitzgerald ; foreword by Tom Peltier.
title_full_unstemmed Information security governance simplified [electronic resource] : from the boardroom to the keyboard / Todd Fitzgerald ; foreword by Tom Peltier.
title_auth Information security governance simplified from the boardroom to the keyboard /
title_new Information security governance simplified
title_sort information security governance simplified from the boardroom to the keyboard /
publisher CRC Press,
publishDate 2012
physical xxviii, 381 p. : ill., port.
isbn 9781439811658 (electronic bk.)
callnumber-first T - Technology
callnumber-subject TK - Electrical and Nuclear Engineering
callnumber-label TK5105
callnumber-sort TK 45105.59 F58 42012
genre Electronic books.
genre_facet Electronic books.
url https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=826929
illustrated Illustrated
dewey-hundreds 000 - Computer science, information & general works
dewey-tens 000 - Computer science, knowledge & systems
dewey-ones 005 - Computer programming, programs & data
dewey-full 005.8
dewey-sort 15.8
dewey-raw 005.8
dewey-search 005.8
oclc_num 785337393
work_keys_str_mv AT fitzgeraldtodd informationsecuritygovernancesimplifiedfromtheboardroomtothekeyboard
AT proquestfirm informationsecuritygovernancesimplifiedfromtheboardroomtothekeyboard
status_str n
ids_txt_mv (MiAaPQ)500826929
(Au-PeEL)EBL826929
(CaPaEBR)ebr10517983
(CaONFJC)MIL352549
(OCoLC)785337393
is_hierarchy_title Information security governance simplified from the boardroom to the keyboard /
author2_original_writing_str_mv noLinkedField
_version_ 1792330723899736064
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02947nam a2200409 a 4500</leader><controlfield tag="001">500826929</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20200520144314.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">111118s2012 fluac sb 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2011043463</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781439811634 (hardback)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781439811658 (electronic bk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)500826929</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL826929</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr10517983</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaONFJC)MIL352549</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)785337393</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.F58 2012</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Fitzgerald, Todd.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security governance simplified</subfield><subfield code="h">[electronic resource] :</subfield><subfield code="b">from the boardroom to the keyboard /</subfield><subfield code="c">Todd Fitzgerald ; foreword by Tom Peltier.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Boca Raton [Fla.] :</subfield><subfield code="b">CRC Press,</subfield><subfield code="c">2012.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxviii, 381 p. :</subfield><subfield code="b">ill., port.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"An Auerbach book."</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure.Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information resources management.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business intelligence.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information technology</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=826929</subfield><subfield code="z">Click to View</subfield></datafield></record></collection>