Managing information risk: a director's guide
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Ely, UK
IT Governance Pub.
2009
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Title from title screen Includes bibliographical references This pocket guide addresses the scope of risks involved in a modern IT system, and outlines strategies for working through the process of putting risk management at the heart of your corporate culture. Given that no two companies are the same, this pocket guide should not be taken as a step-by-step guide, but should provide decision makers with a solid overview of the factors they need to consider and a framework for implementing a regime that suits their needs Introduction; Chapter 1: Managing Risk; Chapter 2: Information Risk Policy; Chapter 3: The Risks; Chapter 4: Risk Management Framework; Chapter 5: Risk Assessment; Chapter 6: Risk Mitigation Strategy; Chapter 7: Controls; Chapter 8: Interacting with Partners and Suppliers; Chapter 9: Standards; Appendix 1: Checklist for Directors; Appendix 2: Establishing an Information Risk Tsar; Further Reading; ITG Resources |
Beschreibung: | 1 Online-Ressource (57 pages) |
ISBN: | 1849280185 1849280193 9781849280181 9781849280198 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043118375 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2009 |||| o||u| ||||||eng d | ||
020 | |a 1849280185 |9 1-84928-018-5 | ||
020 | |a 1849280193 |c electronic bk. |9 1-84928-019-3 | ||
020 | |a 9781849280181 |9 978-1-84928-018-1 | ||
020 | |a 9781849280198 |c electronic bk. |9 978-1-84928-019-8 | ||
035 | |a (OCoLC)614291577 | ||
035 | |a (DE-599)BVBBV043118375 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 658.478 |2 22 | |
100 | 1 | |a Mitchell, Stewart |e Verfasser |4 aut | |
245 | 1 | 0 | |a Managing information risk |b a director's guide |c Stewart Mitchell |
264 | 1 | |a Ely, UK |b IT Governance Pub. |c 2009 | |
300 | |a 1 Online-Ressource (57 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Title from title screen | ||
500 | |a Includes bibliographical references | ||
500 | |a This pocket guide addresses the scope of risks involved in a modern IT system, and outlines strategies for working through the process of putting risk management at the heart of your corporate culture. Given that no two companies are the same, this pocket guide should not be taken as a step-by-step guide, but should provide decision makers with a solid overview of the factors they need to consider and a framework for implementing a regime that suits their needs | ||
500 | |a Introduction; Chapter 1: Managing Risk; Chapter 2: Information Risk Policy; Chapter 3: The Risks; Chapter 4: Risk Management Framework; Chapter 5: Risk Assessment; Chapter 6: Risk Mitigation Strategy; Chapter 7: Controls; Chapter 8: Interacting with Partners and Suppliers; Chapter 9: Standards; Appendix 1: Checklist for Directors; Appendix 2: Establishing an Information Risk Tsar; Further Reading; ITG Resources | ||
650 | 4 | |a Business | |
650 | 4 | |a Data protection / Evaluation | |
650 | 4 | |a Data protection / Economic aspects | |
650 | 4 | |a Information resources management / Economic aspects | |
650 | 4 | |a Business enterprises / Computer networks / Security measures / Evaluation | |
650 | 4 | |a Business enterprises / Computer networks / Security measures / Economic aspects | |
650 | 4 | |a Risk management | |
650 | 7 | |a BUSINESS & ECONOMICS / Corporate Governance |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Leadership |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Organizational Development |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Workplace Culture |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 4 | |a Führung | |
650 | 4 | |a Unternehmen | |
650 | 4 | |a Wirtschaft | |
650 | 4 | |a Data protection |x Evaluation | |
650 | 4 | |a Data protection |x Economic aspects | |
650 | 4 | |a Information resources management |x Economic aspects | |
650 | 4 | |a Business enterprises |x Computer networks |x Security measures |x Evaluation | |
650 | 4 | |a Business enterprises |x Computer networks |x Security measures |x Economic aspects | |
650 | 4 | |a Risk management | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391146 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028542566 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391146 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391146 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175545280233472 |
---|---|
any_adam_object | |
author | Mitchell, Stewart |
author_facet | Mitchell, Stewart |
author_role | aut |
author_sort | Mitchell, Stewart |
author_variant | s m sm |
building | Verbundindex |
bvnumber | BV043118375 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)614291577 (DE-599)BVBBV043118375 |
dewey-full | 658.478 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.478 |
dewey-search | 658.478 |
dewey-sort | 3658.478 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03611nmm a2200649zc 4500</leader><controlfield tag="001">BV043118375</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2009 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849280185</subfield><subfield code="9">1-84928-018-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849280193</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-84928-019-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849280181</subfield><subfield code="9">978-1-84928-018-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849280198</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-84928-019-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)614291577</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043118375</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.478</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Mitchell, Stewart</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Managing information risk</subfield><subfield code="b">a director's guide</subfield><subfield code="c">Stewart Mitchell</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Ely, UK</subfield><subfield code="b">IT Governance Pub.</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (57 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from title screen</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">This pocket guide addresses the scope of risks involved in a modern IT system, and outlines strategies for working through the process of putting risk management at the heart of your corporate culture. Given that no two companies are the same, this pocket guide should not be taken as a step-by-step guide, but should provide decision makers with a solid overview of the factors they need to consider and a framework for implementing a regime that suits their needs</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Introduction; Chapter 1: Managing Risk; Chapter 2: Information Risk Policy; Chapter 3: The Risks; Chapter 4: Risk Management Framework; Chapter 5: Risk Assessment; Chapter 6: Risk Mitigation Strategy; Chapter 7: Controls; Chapter 8: Interacting with Partners and Suppliers; Chapter 9: Standards; Appendix 1: Checklist for Directors; Appendix 2: Establishing an Information Risk Tsar; Further Reading; ITG Resources</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection / Evaluation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection / Economic aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information resources management / Economic aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises / Computer networks / Security measures / Evaluation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises / Computer networks / Security measures / Economic aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Risk management</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Corporate Governance</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Leadership</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Organizational Development</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Workplace Culture</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Führung</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Unternehmen</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wirtschaft</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield><subfield code="x">Evaluation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield><subfield code="x">Economic aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information resources management</subfield><subfield code="x">Economic aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="x">Evaluation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="x">Economic aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Risk management</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391146</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028542566</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391146</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391146</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043118375 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:17:59Z |
institution | BVB |
isbn | 1849280185 1849280193 9781849280181 9781849280198 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028542566 |
oclc_num | 614291577 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (57 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | IT Governance Pub. |
record_format | marc |
spelling | Mitchell, Stewart Verfasser aut Managing information risk a director's guide Stewart Mitchell Ely, UK IT Governance Pub. 2009 1 Online-Ressource (57 pages) txt rdacontent c rdamedia cr rdacarrier Title from title screen Includes bibliographical references This pocket guide addresses the scope of risks involved in a modern IT system, and outlines strategies for working through the process of putting risk management at the heart of your corporate culture. Given that no two companies are the same, this pocket guide should not be taken as a step-by-step guide, but should provide decision makers with a solid overview of the factors they need to consider and a framework for implementing a regime that suits their needs Introduction; Chapter 1: Managing Risk; Chapter 2: Information Risk Policy; Chapter 3: The Risks; Chapter 4: Risk Management Framework; Chapter 5: Risk Assessment; Chapter 6: Risk Mitigation Strategy; Chapter 7: Controls; Chapter 8: Interacting with Partners and Suppliers; Chapter 9: Standards; Appendix 1: Checklist for Directors; Appendix 2: Establishing an Information Risk Tsar; Further Reading; ITG Resources Business Data protection / Evaluation Data protection / Economic aspects Information resources management / Economic aspects Business enterprises / Computer networks / Security measures / Evaluation Business enterprises / Computer networks / Security measures / Economic aspects Risk management BUSINESS & ECONOMICS / Corporate Governance bisacsh BUSINESS & ECONOMICS / Leadership bisacsh BUSINESS & ECONOMICS / Organizational Development bisacsh BUSINESS & ECONOMICS / Workplace Culture bisacsh COMPUTERS / Security / General bisacsh Führung Unternehmen Wirtschaft Data protection Evaluation Data protection Economic aspects Information resources management Economic aspects Business enterprises Computer networks Security measures Evaluation Business enterprises Computer networks Security measures Economic aspects http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391146 Aggregator Volltext |
spellingShingle | Mitchell, Stewart Managing information risk a director's guide Business Data protection / Evaluation Data protection / Economic aspects Information resources management / Economic aspects Business enterprises / Computer networks / Security measures / Evaluation Business enterprises / Computer networks / Security measures / Economic aspects Risk management BUSINESS & ECONOMICS / Corporate Governance bisacsh BUSINESS & ECONOMICS / Leadership bisacsh BUSINESS & ECONOMICS / Organizational Development bisacsh BUSINESS & ECONOMICS / Workplace Culture bisacsh COMPUTERS / Security / General bisacsh Führung Unternehmen Wirtschaft Data protection Evaluation Data protection Economic aspects Information resources management Economic aspects Business enterprises Computer networks Security measures Evaluation Business enterprises Computer networks Security measures Economic aspects |
title | Managing information risk a director's guide |
title_auth | Managing information risk a director's guide |
title_exact_search | Managing information risk a director's guide |
title_full | Managing information risk a director's guide Stewart Mitchell |
title_fullStr | Managing information risk a director's guide Stewart Mitchell |
title_full_unstemmed | Managing information risk a director's guide Stewart Mitchell |
title_short | Managing information risk |
title_sort | managing information risk a director s guide |
title_sub | a director's guide |
topic | Business Data protection / Evaluation Data protection / Economic aspects Information resources management / Economic aspects Business enterprises / Computer networks / Security measures / Evaluation Business enterprises / Computer networks / Security measures / Economic aspects Risk management BUSINESS & ECONOMICS / Corporate Governance bisacsh BUSINESS & ECONOMICS / Leadership bisacsh BUSINESS & ECONOMICS / Organizational Development bisacsh BUSINESS & ECONOMICS / Workplace Culture bisacsh COMPUTERS / Security / General bisacsh Führung Unternehmen Wirtschaft Data protection Evaluation Data protection Economic aspects Information resources management Economic aspects Business enterprises Computer networks Security measures Evaluation Business enterprises Computer networks Security measures Economic aspects |
topic_facet | Business Data protection / Evaluation Data protection / Economic aspects Information resources management / Economic aspects Business enterprises / Computer networks / Security measures / Evaluation Business enterprises / Computer networks / Security measures / Economic aspects Risk management BUSINESS & ECONOMICS / Corporate Governance BUSINESS & ECONOMICS / Leadership BUSINESS & ECONOMICS / Organizational Development BUSINESS & ECONOMICS / Workplace Culture COMPUTERS / Security / General Führung Unternehmen Wirtschaft Data protection Evaluation Data protection Economic aspects Information resources management Economic aspects Business enterprises Computer networks Security measures Evaluation Business enterprises Computer networks Security measures Economic aspects |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391146 |
work_keys_str_mv | AT mitchellstewart managinginformationriskadirectorsguide |