European University Institute Library
  • Services
    • Navigate
    • Linked Data
    • Dashboard
    • Tools / Extras
    • Stats
  • Share
    • Social
      • Mail
      • Twitter
      • Facebook
      • LinkedIn
    • Citation
    • Raw Data
  • Library.Link Network

Information security governance simplified : from the boardroom to the keyboard
Resource Information
The work Information security governance simplified : from the boardroom to the keyboard represents a distinct intellectual or artistic creation found in European University Institute Library. This resource is a combination of several types including: Work, Language Material, Books.

The Resource Information security governance simplified : from the boardroom to the keyboard
Label
Information security governance simplified : from the boardroom to the keyboard
Title remainder
from the boardroom to the keyboard
Statement of responsibility
Todd Fitzgerald
Creator
  • Fitzgerald, Todd.,
Subject
  • Business intelligence
  • Information networks -- Security measures
  • Information resources management
  • Information technology -- Security measures
Language
eng
Summary
Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure.Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations. --
Assigning source
  • Provided by publisher.--
  • Provided by publisher
Illustrations
illustrations
Index
index present
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
Series statement
Open Access e-Books

Context

Context of Information security governance simplified : from the boardroom to the keyboard

Work of

No resources found
No enriched resources found
  • Information security governance simplified : from the boardroom to the keyboard, Todd Fitzgerald, (electronic resource)
  • Information security governance simplified : from the boardroom to the keyboard, Todd Fitzgerald, (electronic resource)
  • Information security governance simplified : from the boardroom to the keyboard, Todd Fitzgerald, (electronic resource)

Embed

Settings

Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.eui.eu/resource/HbY_PAtNcFk/" typeof="CreativeWork http://bibfra.me/vocab/lite/Work"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.eui.eu/resource/HbY_PAtNcFk/">Information security governance simplified : from the boardroom to the keyboard</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.eui.eu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="https://link.library.eui.eu/">European University Institute Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements

Preview

Cite Data - Experimental

Data Citation of the Work Information security governance simplified : from the boardroom to the keyboard

Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.eui.eu/resource/HbY_PAtNcFk/" typeof="CreativeWork http://bibfra.me/vocab/lite/Work"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.eui.eu/resource/HbY_PAtNcFk/">Information security governance simplified : from the boardroom to the keyboard</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.eui.eu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="https://link.library.eui.eu/">European University Institute Library</a></span></span></span></span></div>
SirsiDynix Logo
Structured data from the Bibframe namespace is licensed under the Creative Commons Attribution 4.0 International License by European University Institute Library. Additional terms may apply to data associated with third party namespaces.