๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Information security governance: a practical development and implementation approach

โœ Scribed by Krag Brotby


Publisher
Wiley
Year
2009
Tongue
English
Leaves
193
Series
Wiley series in systems engineering and management
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


The Growing Imperative Need for Effective Information Security Governance

With monotonous regularity, headlines announce ever more spectacular failures of information security and mounting losses. The succession of corporate debacles and dramatic control failures in recent years underscores the necessity for information security to be tightly integrated into the fabric of every organization. The protection of an organization's most valuable asset information can no longer be relegated to low-level technical personnel, but must be considered an essential element of corporate governance that is critical to organizational success and survival.
Written by an industry expert, Information Security Governance is the first book-length treatment of this important topic, providing readers with a step-by-step approach to developing and managing an effective information security program. Beginning with a general overview of governance, the book covers:
โ€ข The business case for information security
โ€ข Defining roles and responsibilities
โ€ข Developing strategic metrics
โ€ข Determining information security outcomes
โ€ข Setting security governance objectives
โ€ข Establishing risk management objectives
โ€ข Developing a cost-effective security strategy
โ€ข A sample strategy development
โ€ข The steps for implementing an effective strategy
โ€ข Developing meaningful security program development metrics
โ€ข Designing relevant information security management metrics
โ€ข Defining incident management and response metrics
Complemented with action plans and sample policies that demonstrate to readers how to put these ideas into practice, Information Security Governance is indispensable reading for any professional who is involved in information security and assurance.


๐Ÿ“œ SIMILAR VOLUMES


Information Security Governance: A Pract
โœ Krag Brotby ๐Ÿ“‚ Library ๐Ÿ“… 2009 ๐Ÿ› Wiley ๐ŸŒ English

The Growing Imperative Need for Effective Information Security Governance<p>With monotonous regularity, headlines announce ever more spectacular failures of information security and mounting losses. The succession of corporate debacles and dramatic control failures in recent years underscores the ne

Information Security Planning: A Practic
โœ Susan Lincke ๐Ÿ“‚ Library ๐Ÿ“… 2024 ๐Ÿ› Springer ๐ŸŒ English

<p><span>This book demonstrates how information security requires a deep understanding of an organization's assets, threats and processes, combined with the technology that can best protect organizational security. It provides step-by-step guidance on how to analyze business processes from a securit

Auditing Information and Cyber Security
โœ Robert E. Davis ๐Ÿ“‚ Library ๐Ÿ“… 2021 ๐Ÿ› CRC Press ๐ŸŒ English

A comprehensive entity security program deploys information asset protection through stratified technological and non-technological controls. Controls are necessary for counteracting threats, opportunities, and vulnerabilities risks in a manner that reduces potential adverse effects to defined, acce

Implementing Information Technology Gove
โœ Wim Van Grembergen, Steven Dehaes ๐Ÿ“‚ Library ๐Ÿ“… 2007 ๐Ÿ› IGI Publishing ๐ŸŒ English

In many organizations, information technology (IT) has become crucial in the support, sustainability, and growth of the business. This pervasive use of technology has created a critical dependency on IT that calls for a specific focus on IT governance. <b>Implementing Information Technology Governa

Implementing Information Technology Gove
โœ Wim Van Grembergen, Steven Dehaes ๐Ÿ“‚ Library ๐Ÿ“… 2007 ๐ŸŒ English

In many organizations, information technology (IT) has become crucial in the support, sustainability, and growth of the business. This pervasive use of technology has created a critical dependency on IT that calls for a specific focus on IT governance. Implementing Information Technology Governance