Coverart for item
The Resource Information security governance simplified : from the boardroom to the keyboard, Todd Fitzgerald, (electronic resource)

Information security governance simplified : from the boardroom to the keyboard, Todd Fitzgerald, (electronic resource)

Label
Information security governance simplified : from the boardroom to the keyboard
Title
Information security governance simplified
Title remainder
from the boardroom to the keyboard
Statement of responsibility
Todd Fitzgerald
Creator
Subject
Language
eng
Summary
Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure.Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations. --
Assigning source
  • Provided by publisher.--
  • Provided by publisher
http://library.link/vocab/creatorName
Fitzgerald, Todd.,
Illustrations
illustrations
Index
index present
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
Series statement
Open Access e-Books
http://library.link/vocab/subjectName
  • Information networks
  • Business intelligence
  • Information resources management
  • Information technology
Label
Information security governance simplified : from the boardroom to the keyboard, Todd Fitzgerald, (electronic resource)
Link
https://www.taylorfrancis.com/books/9781439811658
Instantiates
Publication
Note
An Auerbach book
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
ch. 1. Getting information security right : top to bottom -- ch. 2. Developing information security strategy -- ch. 3. Defining the security management organization -- ch. 4. Interacting with the C-suite -- ch. 5. Managing risk to an acceptable level -- ch. 6. Creating effective information security policies -- ch. 7. Security compliance using control frameworks -- ch. 8. Managerial controls : practical security considerations -- ch. 9. Technical controls : practical security considerations -- ch. 10. Operational controls : practical security considerations -- ch. 11. The auditors have arrived, now what? -- ch. 12. Effective security communications -- ch. 13. The law and information security -- ch. 14. Learning from information security incidents -- ch. 15. 17 ways to dismantle information security governance efforts
Control code
9780429131905
Dimensions
unknown
Extent
1 online resource (xxviii, 403 pages)
Form of item
online
Isbn
9781439811634
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1201/b11357
Specific material designation
remote
System control number
(OCoLC)773298336
Label
Information security governance simplified : from the boardroom to the keyboard, Todd Fitzgerald, (electronic resource)
Link
https://www.taylorfrancis.com/books/9781439811658
Publication
Note
An Auerbach book
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
ch. 1. Getting information security right : top to bottom -- ch. 2. Developing information security strategy -- ch. 3. Defining the security management organization -- ch. 4. Interacting with the C-suite -- ch. 5. Managing risk to an acceptable level -- ch. 6. Creating effective information security policies -- ch. 7. Security compliance using control frameworks -- ch. 8. Managerial controls : practical security considerations -- ch. 9. Technical controls : practical security considerations -- ch. 10. Operational controls : practical security considerations -- ch. 11. The auditors have arrived, now what? -- ch. 12. Effective security communications -- ch. 13. The law and information security -- ch. 14. Learning from information security incidents -- ch. 15. 17 ways to dismantle information security governance efforts
Control code
9780429131905
Dimensions
unknown
Extent
1 online resource (xxviii, 403 pages)
Form of item
online
Isbn
9781439811634
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1201/b11357
Specific material designation
remote
System control number
(OCoLC)773298336

Library Locations

    • Badia FiesolanaBorrow it
      Via dei Roccettini 9, San Domenico di Fiesole, 50014, IT
      43.803074 11.283055