𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Managing an Information Security and Privacy Awareness and Training Program, Second Edition

✍ Scribed by Rebecca Herold


Publisher
CRC Press
Year
2010
Tongue
English
Leaves
544
Edition
2
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Starting with the inception of an education program and progressing through its development, implementation, delivery, and evaluation, Managing an Information Security and Privacy Awareness and Training Program, Second Edition provides authoritative coverage of nearly everything needed to create an effective training program that is compliant with applicable laws, regulations, and policies. Written by Rebecca Herold, a well-respected information security and privacy expert named one of the "Best Privacy Advisers in the World" multiple times by Computerworld magazine as well as a "Top 13 Influencer in IT Security" by IT Security Magazine, the text supplies a proven framework for creating an awareness and training program. It also:

  • Lists the laws and associated excerpts of the specific passages that require training and awareness
  • Contains a plethora of forms, examples, and samples in the book’s 22 appendices
  • Highlights common mistakes that many organizations make
  • Directs readers to additional resources for more specialized information
  • Includes 250 awareness activities ideas and 42 helpful tips for trainers

Complete with case studies and examples from a range of businesses and industries, this all-in-one resource provides the holistic and practical understanding needed to identify and implement the training and awareness methods best suited to, and most effective for, your organization.

Praise for:

The first edition was outstanding. The new second edition is even better ... the definitive and indispensable guide for information security and privacy awareness and training professionals, worth every cent. As with the first edition, we recommend it unreservedly..
β€”NoticeBored.com


πŸ“œ SIMILAR VOLUMES


Building an Information Security Awarene
✍ Mark B. Desman πŸ“‚ Library πŸ“… 2001 🌐 English

In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are insufficient if employees don't kno

Managing Information Systems Security an
✍ Assoc. Prof. Denis Trček Ph.D. (auth.) πŸ“‚ Library πŸ“… 2006 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p><P>The book deals with the management of information systems security and privacy, based on a model that covers technological, organizational and legal views. This is the basis for a focused and methodologically structured approach that presents "the big picture" of information systems security a

Managing Information Systems Security an
✍ Denis Trcek πŸ“‚ Library πŸ“… 2005 πŸ› Springer Science & Business Media 🌐 English

The book deals with the management of information systems security and privacy, based on a model that covers technological, organizational and legal views. This is the basis for a focused and methodologically structured approach that presents "the big picture" of information systems security and pri

Managing Information Security, Second Ed
✍ John R. Vacca πŸ“‚ Library πŸ“… 2013 πŸ› Syngress 🌐 English

<p><i>Managing Information Security</i> offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vu

Managing Information Security, Second Ed
✍ John R. Vacca πŸ“‚ Library πŸ“… 2013 πŸ› Syngress 🌐 English

<p><i>Managing Information Security</i> offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vu