Information security governance simplified : : from the boardroom to the keyboard / / Todd Fitzgerald.
Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to buil...
Saved in:
VerfasserIn: | |
---|---|
Place / Publishing House: | Boca Raton : : CRC Press,, 2012. |
Year of Publication: | 2012 |
Edition: | 1st edition |
Language: | English |
Physical Description: | 1 online resource (617 p.) |
Notes: | An Auerbach book. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
993547235204498 |
---|---|
ctrlnum |
(CKB)2550000000074984 (EBL)826929 (OCoLC)804664124 (SSID)ssj0000551497 (PQKBManifestationID)11338738 (PQKBTitleCode)TC0000551497 (PQKBWorkID)10537750 (PQKB)11140193 (Au-PeEL)EBL826929 (CaPaEBR)ebr10517983 (CaONFJC)MIL352549 (OCoLC)785337393 (OCoLC)773298336 (CaSebORM)9781439811658 (MiAaPQ)EBC826929 (EXLCZ)992550000000074984 |
collection |
bib_alma |
record_format |
marc |
spelling |
Fitzgerald, Todd., author. Information security governance simplified : from the boardroom to the keyboard / Todd Fitzgerald. 1st edition Boca Raton : CRC Press, 2012. 1 online resource (617 p.) text txt computer c online resource cr text file Cover Page; Title Page; Copyright Page; Dedication; Contents; Foreword; Acknowledgments; Introduction; About The Author; Chapter 1: Getting Information Security Right: Top to Bottom; Chapter 2: Developing Information Security Strategy; Chapter 3: Defining the Security Management Organization; Chapter 4: Interacting with the C-Suite; Chapter 5: Managing Risk to an Acceptable Level; Chapter 6: Creating Effective Information Security Policies; Chapter 7: Security Compliance Using Control Frameworks; Chapter 8: Managerial Controls: Practical Security Considerations Chapter 9: Technical Controls: Practical Security ConsiderationsChapter 10: Operational Controls: Practical Security Considerations; Chapter 11: The Auditors Have Arrived, Now What?; Chapter 12: Effective Security Communications; Chapter 13: The Law and Information Security; Chapter 14: Learning From Information Security Incidents; Chapter 15: 17 Ways To Dismantle Information Security Governance Efforts; Index English Includes bibliographical references and index. An Auerbach book. Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure.Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations. -- Provided by publisher. Information networks Security measures. Information resources management. Business intelligence. Information technology Security measures. 1-4665-3292-0 1-4398-1163-6 |
language |
English |
format |
eBook |
author |
Fitzgerald, Todd., |
spellingShingle |
Fitzgerald, Todd., Information security governance simplified : from the boardroom to the keyboard / Cover Page; Title Page; Copyright Page; Dedication; Contents; Foreword; Acknowledgments; Introduction; About The Author; Chapter 1: Getting Information Security Right: Top to Bottom; Chapter 2: Developing Information Security Strategy; Chapter 3: Defining the Security Management Organization; Chapter 4: Interacting with the C-Suite; Chapter 5: Managing Risk to an Acceptable Level; Chapter 6: Creating Effective Information Security Policies; Chapter 7: Security Compliance Using Control Frameworks; Chapter 8: Managerial Controls: Practical Security Considerations Chapter 9: Technical Controls: Practical Security ConsiderationsChapter 10: Operational Controls: Practical Security Considerations; Chapter 11: The Auditors Have Arrived, Now What?; Chapter 12: Effective Security Communications; Chapter 13: The Law and Information Security; Chapter 14: Learning From Information Security Incidents; Chapter 15: 17 Ways To Dismantle Information Security Governance Efforts; Index |
author_facet |
Fitzgerald, Todd., |
author_variant |
t f tf |
author_role |
VerfasserIn |
author_sort |
Fitzgerald, Todd., |
title |
Information security governance simplified : from the boardroom to the keyboard / |
title_sub |
from the boardroom to the keyboard / |
title_full |
Information security governance simplified : from the boardroom to the keyboard / Todd Fitzgerald. |
title_fullStr |
Information security governance simplified : from the boardroom to the keyboard / Todd Fitzgerald. |
title_full_unstemmed |
Information security governance simplified : from the boardroom to the keyboard / Todd Fitzgerald. |
title_auth |
Information security governance simplified : from the boardroom to the keyboard / |
title_new |
Information security governance simplified : |
title_sort |
information security governance simplified : from the boardroom to the keyboard / |
publisher |
CRC Press, |
publishDate |
2012 |
physical |
1 online resource (617 p.) |
edition |
1st edition |
contents |
Cover Page; Title Page; Copyright Page; Dedication; Contents; Foreword; Acknowledgments; Introduction; About The Author; Chapter 1: Getting Information Security Right: Top to Bottom; Chapter 2: Developing Information Security Strategy; Chapter 3: Defining the Security Management Organization; Chapter 4: Interacting with the C-Suite; Chapter 5: Managing Risk to an Acceptable Level; Chapter 6: Creating Effective Information Security Policies; Chapter 7: Security Compliance Using Control Frameworks; Chapter 8: Managerial Controls: Practical Security Considerations Chapter 9: Technical Controls: Practical Security ConsiderationsChapter 10: Operational Controls: Practical Security Considerations; Chapter 11: The Auditors Have Arrived, Now What?; Chapter 12: Effective Security Communications; Chapter 13: The Law and Information Security; Chapter 14: Learning From Information Security Incidents; Chapter 15: 17 Ways To Dismantle Information Security Governance Efforts; Index |
isbn |
1-4665-5128-3 0-429-13190-9 1-280-12163-7 9786613525499 1-4398-1165-2 1-4665-3292-0 1-4398-1163-6 |
callnumber-first |
T - Technology |
callnumber-subject |
TK - Electrical and Nuclear Engineering |
callnumber-label |
TK5105 |
callnumber-sort |
TK 45105.59 F58 42012 |
illustrated |
Illustrated |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-tens |
000 - Computer science, knowledge & systems |
dewey-ones |
005 - Computer programming, programs & data |
dewey-full |
005.8 |
dewey-sort |
15.8 |
dewey-raw |
005.8 |
dewey-search |
005.8 |
oclc_num |
804664124 785337393 773298336 |
work_keys_str_mv |
AT fitzgeraldtodd informationsecuritygovernancesimplifiedfromtheboardroomtothekeyboard |
status_str |
c |
ids_txt_mv |
(CKB)2550000000074984 (EBL)826929 (OCoLC)804664124 (SSID)ssj0000551497 (PQKBManifestationID)11338738 (PQKBTitleCode)TC0000551497 (PQKBWorkID)10537750 (PQKB)11140193 (Au-PeEL)EBL826929 (CaPaEBR)ebr10517983 (CaONFJC)MIL352549 (OCoLC)785337393 (OCoLC)773298336 (CaSebORM)9781439811658 (MiAaPQ)EBC826929 (EXLCZ)992550000000074984 |
carrierType_str_mv |
cr |
is_hierarchy_title |
Information security governance simplified : from the boardroom to the keyboard / |
_version_ |
1766653442929983488 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03282cam a2200289Ii 4500</leader><controlfield tag="001">993547235204498</controlfield><controlfield tag="005">20200520144314.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr -n---------</controlfield><controlfield tag="008">180331s2012 flua ob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2011043463</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1-4665-5128-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0-429-13190-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1-280-12163-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786613525499</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1-4398-1165-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1201/b11357 </subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)2550000000074984</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EBL)826929</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)804664124</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(SSID)ssj0000551497</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBManifestationID)11338738</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBTitleCode)TC0000551497</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBWorkID)10537750</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKB)11140193</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL826929</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr10517983</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaONFJC)MIL352549</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)785337393</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)773298336</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaSebORM)9781439811658</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC826929</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)992550000000074984</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.F58 2012</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">BUS073000</subfield><subfield code="a">COM032000</subfield><subfield code="a">COM053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="090" ind1=" " ind2=" "><subfield code="a">TK5105.59</subfield><subfield code="b">.F58 2012</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Fitzgerald, Todd.,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security governance simplified :</subfield><subfield code="b">from the boardroom to the keyboard /</subfield><subfield code="c">Todd Fitzgerald.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton :</subfield><subfield code="b">CRC Press,</subfield><subfield code="c">2012.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (617 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover Page; Title Page; Copyright Page; Dedication; Contents; Foreword; Acknowledgments; Introduction; About The Author; Chapter 1: Getting Information Security Right: Top to Bottom; Chapter 2: Developing Information Security Strategy; Chapter 3: Defining the Security Management Organization; Chapter 4: Interacting with the C-Suite; Chapter 5: Managing Risk to an Acceptable Level; Chapter 6: Creating Effective Information Security Policies; Chapter 7: Security Compliance Using Control Frameworks; Chapter 8: Managerial Controls: Practical Security Considerations</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Chapter 9: Technical Controls: Practical Security ConsiderationsChapter 10: Operational Controls: Practical Security Considerations; Chapter 11: The Auditors Have Arrived, Now What?; Chapter 12: Effective Security Communications; Chapter 13: The Law and Information Security; Chapter 14: Learning From Information Security Incidents; Chapter 15: 17 Ways To Dismantle Information Security Governance Efforts; Index</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">An Auerbach book.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure.Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations. --</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information resources management.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business intelligence.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information technology</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">1-4665-3292-0</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">1-4398-1163-6</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-05-23 04:34:04 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2012-02-25 23:16:17 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5338493060004498&Force_direct=true</subfield><subfield code="Z">5338493060004498</subfield><subfield code="8">5338493060004498</subfield></datafield></record></collection> |