Information security governance simplified : : from the boardroom to the keyboard / / Todd Fitzgerald.

Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to buil...

Full description

Saved in:
Bibliographic Details
VerfasserIn:
Place / Publishing House:Boca Raton : : CRC Press,, 2012.
Year of Publication:2012
Edition:1st edition
Language:English
Physical Description:1 online resource (617 p.)
Notes:An Auerbach book.
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 03282cam a2200289Ii 4500
001 993547235204498
005 20200520144314.0
006 m o d |
007 cr -n---------
008 180331s2012 flua ob 001 0 eng d
010 |z  2011043463 
020 |a 1-4665-5128-3 
020 |a 0-429-13190-9 
020 |a 1-280-12163-7 
020 |a 9786613525499 
020 |a 1-4398-1165-2 
024 7 |a 10.1201/b11357   |2 doi 
035 |a (CKB)2550000000074984 
035 |a (EBL)826929 
035 |a (OCoLC)804664124 
035 |a (SSID)ssj0000551497 
035 |a (PQKBManifestationID)11338738 
035 |a (PQKBTitleCode)TC0000551497 
035 |a (PQKBWorkID)10537750 
035 |a (PQKB)11140193 
035 |a (Au-PeEL)EBL826929 
035 |a (CaPaEBR)ebr10517983 
035 |a (CaONFJC)MIL352549 
035 |a (OCoLC)785337393 
035 |a (OCoLC)773298336 
035 |a (CaSebORM)9781439811658 
035 |a (MiAaPQ)EBC826929 
035 |a (EXLCZ)992550000000074984 
040 |a MiAaPQ  |c MiAaPQ  |d MiAaPQ 
041 |a eng 
050 4 |a TK5105.59  |b .F58 2012 
082 0 4 |a 005.8  |2 23 
084 |a BUS073000  |a COM032000  |a COM053000  |2 bisacsh 
090 |a TK5105.59  |b .F58 2012 
100 1 |a Fitzgerald, Todd.,  |e author. 
245 1 0 |a Information security governance simplified :  |b from the boardroom to the keyboard /  |c Todd Fitzgerald. 
250 |a 1st edition 
264 1 |a Boca Raton :  |b CRC Press,  |c 2012. 
300 |a 1 online resource (617 p.) 
336 |a text  |b txt 
337 |a computer  |b c 
338 |a online resource  |b cr 
347 |a text file 
505 0 |a Cover Page; Title Page; Copyright Page; Dedication; Contents; Foreword; Acknowledgments; Introduction; About The Author; Chapter 1: Getting Information Security Right: Top to Bottom; Chapter 2: Developing Information Security Strategy; Chapter 3: Defining the Security Management Organization; Chapter 4: Interacting with the C-Suite; Chapter 5: Managing Risk to an Acceptable Level; Chapter 6: Creating Effective Information Security Policies; Chapter 7: Security Compliance Using Control Frameworks; Chapter 8: Managerial Controls: Practical Security Considerations 
505 8 |a Chapter 9: Technical Controls: Practical Security ConsiderationsChapter 10: Operational Controls: Practical Security Considerations; Chapter 11: The Auditors Have Arrived, Now What?; Chapter 12: Effective Security Communications; Chapter 13: The Law and Information Security; Chapter 14: Learning From Information Security Incidents; Chapter 15: 17 Ways To Dismantle Information Security Governance Efforts; Index 
546 |a English 
504 |a Includes bibliographical references and index. 
500 |a An Auerbach book. 
520 |a Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure.Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations. --  |c Provided by publisher. 
650 0 |a Information networks  |x Security measures. 
650 0 |a Information resources management. 
650 0 |a Business intelligence. 
650 0 |a Information technology  |x Security measures. 
776 |z 1-4665-3292-0 
776 |z 1-4398-1163-6 
906 |a BOOK 
ADM |b 2023-05-23 04:34:04 Europe/Vienna  |f system  |c marc21  |a 2012-02-25 23:16:17 Europe/Vienna  |g false 
AVE |P DOAB Directory of Open Access Books  |x https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5338493060004498&Force_direct=true  |Z 5338493060004498  |8 5338493060004498