Item Details

Information Security Governance Simplified [electronic resource]: From the Boardroom to the Keyboard

Todd Fitzgerald ; foreword by Tom Peltier
Format
EBook; Book; Online
Published
Boca Raton ; London : CRC Press, c2012.
Language
English
ISBN
9781439811634 (hardback)
Summary
"Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure.Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations. "--
Description
Mode of access: World wide Web.
Notes
Includes bibliographical references and index.
Logo for Copyright Not EvaluatedCopyright Not Evaluated
Technical Details
  • Access in Virgo Classic

  • LEADER 02758nam a2200373 a 4500
    001 u6403496
    003 SIRSI
    005 20140918132457.0
    006 m d
    007 cr n
    008 111118s2012 flua sb 001 0 eng d
    010
      
      
    a| 2011043463
    020
      
      
    a| 9781439811634 (hardback)
    035
      
      
    a| (WaSeSS)ssj0000551497
    040
      
      
    a| DLC c| DLC d| DLC d| WaSeSS
    042
      
      
    a| pcc
    050
    0
    0
    a| TK5105.59 b| .F58 2012
    082
    0
    0
    a| 005.8 2| 23
    084
      
      
    a| BUS073000 a| COM032000 a| COM053000 2| bisacsh
    100
    1
      
    a| Fitzgerald, Todd.
    245
    1
    0
    a| Information security governance simplified h| [electronic resource] : b| from the boardroom to the keyboard / c| Todd Fitzgerald ; foreword by Tom Peltier.
    260
      
      
    a| Boca Raton ; a| London : b| CRC Press, c| c2012.
    504
      
      
    a| Includes bibliographical references and index.
    520
      
      
    a| "Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure.Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations. "-- c| Provided by publisher.
    538
      
      
    a| Mode of access: World wide Web.
    650
      
    0
    a| Information networks x| Security measures.
    650
      
    0
    a| Information resources management.
    650
      
    0
    a| Business intelligence.
    650
      
    0
    a| Information technology x| Security measures.
    655
      
    0
    a| Electronic books.
    710
    2
      
    a| Safari Books Online
    856
    4
    0
    u| http://RE5QY4SB7X.search.serialssolutions.com/?V=1.0&L=RE5QY4SB7X&S=JCs&C=TC0000551497&T=marc
    596
      
      
    a| 1
    999
      
      
    a| XX(6403496.1) w| WEB i| 6403496-1001 l| INTERNET m| UVA-LIB t| INTERNET

Availability

Google Preview

Read Online