Information Security Governance: A Practical Development and Implementation Approach
By Krag Brotby
()
Currently unavailable
Currently unavailable
About this ebook
With monotonous regularity, headlines announce ever more spectacular failures of information security and mounting losses. The succession of corporate debacles and dramatic control failures in recent years underscores the necessity for information security to be tightly integrated into the fabric of every organization. The protection of an organization's most valuable asset information can no longer be relegated to low-level technical personnel, but must be considered an essential element of corporate governance that is critical to organizational success and survival.
Written by an industry expert, Information Security Governance is the first book-length treatment of this important topic, providing readers with a step-by-step approach to developing and managing an effective information security program. Beginning with a general overview of governance, the book covers:
-
The business case for information security
-
Defining roles and responsibilities
-
Developing strategic metrics
-
Determining information security outcomes
-
Setting security governance objectives
-
Establishing risk management objectives
-
Developing a cost-effective security strategy
-
A sample strategy development
-
The steps for implementing an effective strategy
-
Developing meaningful security program development metrics
-
Designing relevant information security management metrics
-
Defining incident management and response metrics
Complemented with action plans and sample policies that demonstrate to readers how to put these ideas into practice, Information Security Governance is indispensable reading for any professional who is involved in information security and assurance.
Related to Information Security Governance
Titles in the series (33)
Verification and Validation for Quality of UML 2.0 Models Rating: 0 out of 5 stars0 ratingsManaging Complex Systems: Thinking Outside the Box Rating: 0 out of 5 stars0 ratingsTech Mining: Exploiting New Technologies for Competitive Advantage Rating: 5 out of 5 stars5/5Holistic Management: Managing What Matters for Company Success Rating: 0 out of 5 stars0 ratingsLean Enterprise Systems: Using IT for Continuous Improvement Rating: 0 out of 5 stars0 ratingsEnterprise Transformation: Understanding and Enabling Fundamental Change Rating: 0 out of 5 stars0 ratingsArchitecting Resilient Systems: Accident Avoidance and Survival and Recovery from Disruptions Rating: 0 out of 5 stars0 ratingsSystem of Systems Engineering: Innovations for the 21st Century Rating: 0 out of 5 stars0 ratingsSecurity Risk Management Body of Knowledge Rating: 0 out of 5 stars0 ratingsStimulating Innovation in Products and Services: With Function Analysis and Mapping Rating: 0 out of 5 stars0 ratingsPeople and Organizations: Explorations of Human-Centered Design Rating: 0 out of 5 stars0 ratingsSystems Engineering Principles and Practice Rating: 3 out of 5 stars3/5Decision Making in Systems Engineering and Management Rating: 0 out of 5 stars0 ratingsLean for Systems Engineering with Lean Enablers for Systems Engineering Rating: 0 out of 5 stars0 ratingsThe Global Manufacturing Revolution: Product-Process-Business Integration and Reconfigurable Systems Rating: 0 out of 5 stars0 ratingsOperations and Production Systems with Multiple Objectives Rating: 0 out of 5 stars0 ratingsSmart Data: Enterprise Performance Optimization Strategy Rating: 0 out of 5 stars0 ratingsSystem Engineering Management Rating: 5 out of 5 stars5/5Information Security Governance: A Practical Development and Implementation Approach Rating: 0 out of 5 stars0 ratingsReliability, Maintainability, and Supportability: Best Practices for Systems Engineers Rating: 0 out of 5 stars0 ratingsConcept-Oriented Research and Development in Information Technology Rating: 0 out of 5 stars0 ratingsStrategies to the Prediction, Mitigation and Management of Product Obsolescence Rating: 0 out of 5 stars0 ratingsModel-Based System Architecture Rating: 0 out of 5 stars0 ratingsForensic Systems Engineering: Evaluating Operations by Discovery Rating: 0 out of 5 stars0 ratingsPractical Creativity and Innovation in Systems Engineering Rating: 0 out of 5 stars0 ratings
Security For You
CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Hacking : Guide to Computer Hacking and Penetration Testing Rating: 5 out of 5 stars5/5Dark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Hacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5CompTIA CySA+ Practice Tests: Exam CS0-002 Rating: 0 out of 5 stars0 ratingsMike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5CompTIA Network+ Practice Tests: Exam N10-008 Rating: 0 out of 5 stars0 ratingsEthical Hacking 101 - How to conduct professional pentestings in 21 days or less!: How to hack, #1 Rating: 5 out of 5 stars5/5CompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsNetwork+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Hacking For Dummies Rating: 4 out of 5 stars4/5IAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratings
Reviews for Information Security Governance
0 ratings0 reviews