๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Building a Practical Information Security Program

โœ Scribed by Jason Andress, Mark Leary


Publisher
Syngress
Year
2017
Tongue
English
Leaves
188
Edition
1
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Building a Practical Information Security Program provides users with a strategic view on how to build an information security program that aligns with business objectives. The information provided enables both executive management and IT managers not only to validate existing security programs, but also to build new business-driven security programs. In addition, the subject matter supports aspiring security engineers to forge a career path to successfully manage a security program, thereby adding value and reducing risk to the business. Readers learn how to translate technical challenges into business requirements, understand when to "go big or go home," explore in-depth defense strategies, and review tactics on when to absorb risks. This book explains how to properly plan and implement an infosec program based on business strategy and results.

  • Provides a roadmap on how to build a security program that will protect companies from intrusion
  • Shows how to focus the security program on its essential mission and move past FUD (fear, uncertainty, and doubt) to provide business value
  • Teaches how to build consensus with an effective business-focused program

โœฆ Table of Contents


Content:
Front Matter,Copyright,About the AuthorsEntitled to full textChapter 0 - Why We Need Security Programs, Pages 1-22
Chapter 1 - Develop an Information Security Strategy, Pages 23-34
Chapter 2 - Integrate Security Into the Organization, Pages 35-44
Chapter 3 - Establish a Security Organization, Pages 45-62
Chapter 4 - Why Information Security Policies?, Pages 63-75
Chapter 5 - Manage the Risks, Pages 77-102
Chapter 6 - Protect the Data, Pages 103-123
Chapter 7 - Manage the Security of Third Parties and Vendors, Pages 125-133
Chapter 8 - Conduct Security Awareness and Training, Pages 135-155
Chapter 9 - Security Compliance Management and Auditing, Pages 157-167
Chapter 10 - Information Security Program Metrics, Pages 169-183
Index, Pages 185-191

โœฆ Subjects


COMPUTERS;Internet;Security;COMPUTERS;Networking;Security;COMPUTERS;Security;General;Computer networks;Security measures;Information storage and retrieval systems;Security measures;Computer security


๐Ÿ“œ SIMILAR VOLUMES


Building a Practical Information Securit
โœ Jason Andress, Mark Leary ๐Ÿ“‚ Library ๐Ÿ› Syngress ๐ŸŒ English

<p><span>Building a Practical Information Security Program</span><span> provides users with a strategic view on how to build an information security program that aligns with business objectives. The information provided enables both executive management and IT managers not only to validate existing

Implementing Information Security in Hea
โœ Herzig, Terrell W(Editor);Walsh, Tom(Editor);Gallagher, Lisa A(Editor) ๐Ÿ“‚ Library ๐Ÿ“… 2013 ๐Ÿ› Healthcare Information and Management Systems Soci ๐ŸŒ English

Implementing Information Security in Healthcare: Building a Security Program offers a critical and comprehensive look at healthcare security concerns in an era of powerful computer technology, increased mobility, and complex regulations designed to protect personal information. Featuring perspective

Building an Information Security Awarene
โœ Mark B. Desman ๐Ÿ“‚ Library ๐Ÿ“… 2001 ๐ŸŒ English

In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are insufficient if employees don't kno

Building a Comprehensive IT Security Pro
โœ Jeremy Wittkop ๐Ÿ“‚ Library ๐Ÿ“… 2016 ๐Ÿ› Apress ๐ŸŒ English

<p>This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It

Building a Comprehensive IT Security Pro
โœ Jeremy Wittkop (auth.) ๐Ÿ“‚ Library ๐Ÿ“… 2016 ๐Ÿ› Apress ๐ŸŒ English

This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It cl