The Resource Information security governance simplified : from the boardroom to the keyboard, Todd Fitzgerald, (electronic resource)
Information security governance simplified : from the boardroom to the keyboard, Todd Fitzgerald, (electronic resource)
Resource Information
The item Information security governance simplified : from the boardroom to the keyboard, Todd Fitzgerald, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in European University Institute Library.This item is available to borrow from 1 library branch.
Resource Information
The item Information security governance simplified : from the boardroom to the keyboard, Todd Fitzgerald, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in European University Institute Library.
This item is available to borrow from 1 library branch.
- Summary
- Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure.Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations. --
- Language
- eng
- Extent
- 1 online resource (xxviii, 403 pages)
- Note
- An Auerbach book
- Contents
-
- ch. 1. Getting information security right : top to bottom
- ch. 2. Developing information security strategy
- ch. 3. Defining the security management organization
- ch. 4. Interacting with the C-suite
- ch. 5. Managing risk to an acceptable level
- ch. 6. Creating effective information security policies
- ch. 7. Security compliance using control frameworks
- ch. 8. Managerial controls : practical security considerations
- ch. 9. Technical controls : practical security considerations
- ch. 10. Operational controls : practical security considerations
- ch. 11. The auditors have arrived, now what?
- ch. 12. Effective security communications
- ch. 13. The law and information security
- ch. 14. Learning from information security incidents
- ch. 15. 17 ways to dismantle information security governance efforts
- Isbn
- 9781439811634
- Label
- Information security governance simplified : from the boardroom to the keyboard
- Title
- Information security governance simplified
- Title remainder
- from the boardroom to the keyboard
- Statement of responsibility
- Todd Fitzgerald
- Language
- eng
- Summary
- Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure.Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations. --
- Assigning source
-
- Provided by publisher.--
- Provided by publisher
- http://library.link/vocab/creatorName
- Fitzgerald, Todd.,
- Illustrations
- illustrations
- Index
- index present
- Literary form
- non fiction
- Nature of contents
-
- dictionaries
- bibliography
- Series statement
- Open Access e-Books
- http://library.link/vocab/subjectName
-
- Information networks
- Business intelligence
- Information resources management
- Information technology
- Label
- Information security governance simplified : from the boardroom to the keyboard, Todd Fitzgerald, (electronic resource)
- Note
- An Auerbach book
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- ch. 1. Getting information security right : top to bottom -- ch. 2. Developing information security strategy -- ch. 3. Defining the security management organization -- ch. 4. Interacting with the C-suite -- ch. 5. Managing risk to an acceptable level -- ch. 6. Creating effective information security policies -- ch. 7. Security compliance using control frameworks -- ch. 8. Managerial controls : practical security considerations -- ch. 9. Technical controls : practical security considerations -- ch. 10. Operational controls : practical security considerations -- ch. 11. The auditors have arrived, now what? -- ch. 12. Effective security communications -- ch. 13. The law and information security -- ch. 14. Learning from information security incidents -- ch. 15. 17 ways to dismantle information security governance efforts
- Control code
- 9780429131905
- Dimensions
- unknown
- Extent
- 1 online resource (xxviii, 403 pages)
- Form of item
- online
- Isbn
- 9781439811634
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 10.1201/b11357
- Specific material designation
- remote
- System control number
- (OCoLC)773298336
- Label
- Information security governance simplified : from the boardroom to the keyboard, Todd Fitzgerald, (electronic resource)
- Note
- An Auerbach book
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- ch. 1. Getting information security right : top to bottom -- ch. 2. Developing information security strategy -- ch. 3. Defining the security management organization -- ch. 4. Interacting with the C-suite -- ch. 5. Managing risk to an acceptable level -- ch. 6. Creating effective information security policies -- ch. 7. Security compliance using control frameworks -- ch. 8. Managerial controls : practical security considerations -- ch. 9. Technical controls : practical security considerations -- ch. 10. Operational controls : practical security considerations -- ch. 11. The auditors have arrived, now what? -- ch. 12. Effective security communications -- ch. 13. The law and information security -- ch. 14. Learning from information security incidents -- ch. 15. 17 ways to dismantle information security governance efforts
- Control code
- 9780429131905
- Dimensions
- unknown
- Extent
- 1 online resource (xxviii, 403 pages)
- Form of item
- online
- Isbn
- 9781439811634
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 10.1201/b11357
- Specific material designation
- remote
- System control number
- (OCoLC)773298336
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.eui.eu/portal/Information-security-governance-simplified--from/Awb9UP1xowk/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.eui.eu/portal/Information-security-governance-simplified--from/Awb9UP1xowk/">Information security governance simplified : from the boardroom to the keyboard, Todd Fitzgerald, (electronic resource)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.eui.eu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="https://link.library.eui.eu/">European University Institute Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Information security governance simplified : from the boardroom to the keyboard, Todd Fitzgerald, (electronic resource)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.eui.eu/portal/Information-security-governance-simplified--from/Awb9UP1xowk/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.eui.eu/portal/Information-security-governance-simplified--from/Awb9UP1xowk/">Information security governance simplified : from the boardroom to the keyboard, Todd Fitzgerald, (electronic resource)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.eui.eu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="https://link.library.eui.eu/">European University Institute Library</a></span></span></span></span></div>