Information security governance simplified: from the boardroom to the keyboard
"Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks t...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Schlagworte: | |
Online-Zugang: | kostenfrei |
Zusammenfassung: | "Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure. Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations."-- |
Beschreibung: | 1 Online-Ressource (xxviii, 381 Seiten) illustrations |
ISBN: | 0429131909 1439811652 1466551283 9780429131905 9781439811658 9781466551282 |
Zugangseinschränkungen: | Open Access |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV048282429 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 220610s2012 |||| o||u| ||||||eng d | ||
020 | |a 0429131909 |9 0429131909 | ||
020 | |a 1439811652 |q (electronic bk.) |9 1439811652 | ||
020 | |a 1466551283 |9 1466551283 | ||
020 | |a 9780429131905 |q (ebook : PDF) |9 9780429131905 | ||
020 | |a 9781439811658 |q (electronic bk.) |9 9781439811658 | ||
020 | |a 9781466551282 |q (ebook) |9 9781466551282 | ||
020 | |z 1439811636 |9 1439811636 | ||
020 | |z 9781439811634 |9 9781439811634 | ||
024 | 7 | |a 10.1201/b11357 |2 doi | |
035 | |a (OCoLC)773298336 | ||
035 | |a (DE-599)BVBBV048282429 | ||
040 | |a DE-604 |b ger | ||
041 | 0 | |a eng | |
049 | |a DE-355 | ||
100 | 1 | |a Fitzgerald, Todd |e Verfasser |4 aut | |
245 | 1 | 0 | |a Information security governance simplified |b from the boardroom to the keyboard |c Todd Fitzgerald |
264 | 0 | |a Boca Raton |b CRC Press |c ©2012 | |
300 | |a 1 Online-Ressource (xxviii, 381 Seiten) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
505 | 8 | |a Ch. 1. Getting information security right : top to bottom -- ch. 2. Developing information security strategy -- ch. 3. Defining the security management organization -- ch. 4. Interacting with the C-suite -- ch. 5. Managing risk to an acceptable level -- ch. 6. Creating effective information security policies -- ch. 7. Security compliance using control frameworks -- ch. 8. Managerial controls : practical security considerations -- ch. 9. Technical controls : practical security considerations -- ch. 10. Operational controls : practical security considerations -- ch. 11. The auditors have arrived, now what? -- ch. 12. Effective security communications -- ch. 13. The law and information security -- ch. 14. Learning from information security incidents -- ch. 15. 17 ways to dismantle information security governance efforts | |
506 | 0 | |a Open Access |5 EbpS | |
520 | 3 | |a "Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure. Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations."-- | |
650 | 7 | |a BUSINESS & ECONOMICS |2 Commerce | |
650 | 4 | |a Business intelligence | |
650 | 7 | |a COMPUTERS |2 Information Technology | |
650 | 7 | |a COMPUTERS |2 Internet | |
650 | 7 | |a COMPUTERS |2 Networking | |
650 | 7 | |a COMPUTERS |2 Security | |
650 | 7 | |a Information networks |2 Security measures | |
650 | 4 | |a Information resources management | |
650 | 7 | |a Information technology |2 Security measures | |
650 | 4 | |a Business intelligence | |
650 | 4 | |a Information networks |x Security measures | |
650 | 4 | |a Information resources management | |
650 | 4 | |a Information technology |x Security measures | |
653 | 6 | |a Electronic books | |
653 | 6 | |a Electronic books | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Fitzgerald, Todd |t Information security governance simplified |d Boca Raton : CRC Press, 2011 |z 9781439811634 |
856 | 4 | 0 | |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=411946 |x Verlag |z kostenfrei |3 Volltext |
912 | |a ZDB-4-EOAC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-033662595 | ||
347 | |a data file |2 rda |
Datensatz im Suchindex
_version_ | 1804184108415320064 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Fitzgerald, Todd |
author_facet | Fitzgerald, Todd |
author_role | aut |
author_sort | Fitzgerald, Todd |
author_variant | t f tf |
building | Verbundindex |
bvnumber | BV048282429 |
collection | ZDB-4-EOAC |
contents | Ch. 1. Getting information security right : top to bottom -- ch. 2. Developing information security strategy -- ch. 3. Defining the security management organization -- ch. 4. Interacting with the C-suite -- ch. 5. Managing risk to an acceptable level -- ch. 6. Creating effective information security policies -- ch. 7. Security compliance using control frameworks -- ch. 8. Managerial controls : practical security considerations -- ch. 9. Technical controls : practical security considerations -- ch. 10. Operational controls : practical security considerations -- ch. 11. The auditors have arrived, now what? -- ch. 12. Effective security communications -- ch. 13. The law and information security -- ch. 14. Learning from information security incidents -- ch. 15. 17 ways to dismantle information security governance efforts |
ctrlnum | (OCoLC)773298336 (DE-599)BVBBV048282429 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04464nmm a2200613 c 4500</leader><controlfield tag="001">BV048282429</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">220610s2012 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0429131909</subfield><subfield code="9">0429131909</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1439811652</subfield><subfield code="q">(electronic bk.)</subfield><subfield code="9">1439811652</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1466551283</subfield><subfield code="9">1466551283</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780429131905</subfield><subfield code="q">(ebook : PDF)</subfield><subfield code="9">9780429131905</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781439811658</subfield><subfield code="q">(electronic bk.)</subfield><subfield code="9">9781439811658</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781466551282</subfield><subfield code="q">(ebook)</subfield><subfield code="9">9781466551282</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1439811636</subfield><subfield code="9">1439811636</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781439811634</subfield><subfield code="9">9781439811634</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1201/b11357</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)773298336</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048282429</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Fitzgerald, Todd</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security governance simplified</subfield><subfield code="b">from the boardroom to the keyboard</subfield><subfield code="c">Todd Fitzgerald</subfield></datafield><datafield tag="264" ind1=" " ind2="0"><subfield code="a">Boca Raton</subfield><subfield code="b">CRC Press</subfield><subfield code="c">©2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxviii, 381 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Ch. 1. Getting information security right : top to bottom -- ch. 2. Developing information security strategy -- ch. 3. Defining the security management organization -- ch. 4. Interacting with the C-suite -- ch. 5. Managing risk to an acceptable level -- ch. 6. Creating effective information security policies -- ch. 7. Security compliance using control frameworks -- ch. 8. Managerial controls : practical security considerations -- ch. 9. Technical controls : practical security considerations -- ch. 10. Operational controls : practical security considerations -- ch. 11. The auditors have arrived, now what? -- ch. 12. Effective security communications -- ch. 13. The law and information security -- ch. 14. Learning from information security incidents -- ch. 15. 17 ways to dismantle information security governance efforts</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">Open Access</subfield><subfield code="5">EbpS</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure. Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations."--</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="2">Commerce</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="2">Information Technology</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="2">Internet</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="2">Networking</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="2">Security</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information networks</subfield><subfield code="2">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information resources management</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information technology</subfield><subfield code="2">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information resources management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="653" ind1=" " ind2="6"><subfield code="a">Electronic books</subfield></datafield><datafield tag="653" ind1=" " ind2="6"><subfield code="a">Electronic books</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Fitzgerald, Todd</subfield><subfield code="t">Information security governance simplified</subfield><subfield code="d">Boca Raton : CRC Press, 2011</subfield><subfield code="z">9781439811634</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=411946</subfield><subfield code="x">Verlag</subfield><subfield code="z">kostenfrei</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EOAC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033662595</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield><subfield code="2">rda</subfield></datafield></record></collection> |
id | DE-604.BV048282429 |
illustrated | Illustrated |
index_date | 2024-07-03T20:00:57Z |
indexdate | 2024-07-10T09:34:06Z |
institution | BVB |
isbn | 0429131909 1439811652 1466551283 9780429131905 9781439811658 9781466551282 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033662595 |
oclc_num | 773298336 |
open_access_boolean | 1 |
owner | DE-355 DE-BY-UBR |
owner_facet | DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (xxviii, 381 Seiten) illustrations |
psigel | ZDB-4-EOAC |
publishDateSearch | 2012 |
publishDateSort | 2012 |
record_format | marc |
spelling | Fitzgerald, Todd Verfasser aut Information security governance simplified from the boardroom to the keyboard Todd Fitzgerald Boca Raton CRC Press ©2012 1 Online-Ressource (xxviii, 381 Seiten) illustrations txt rdacontent c rdamedia cr rdacarrier Ch. 1. Getting information security right : top to bottom -- ch. 2. Developing information security strategy -- ch. 3. Defining the security management organization -- ch. 4. Interacting with the C-suite -- ch. 5. Managing risk to an acceptable level -- ch. 6. Creating effective information security policies -- ch. 7. Security compliance using control frameworks -- ch. 8. Managerial controls : practical security considerations -- ch. 9. Technical controls : practical security considerations -- ch. 10. Operational controls : practical security considerations -- ch. 11. The auditors have arrived, now what? -- ch. 12. Effective security communications -- ch. 13. The law and information security -- ch. 14. Learning from information security incidents -- ch. 15. 17 ways to dismantle information security governance efforts Open Access EbpS "Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure. Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations."-- BUSINESS & ECONOMICS Commerce Business intelligence COMPUTERS Information Technology COMPUTERS Internet COMPUTERS Networking COMPUTERS Security Information networks Security measures Information resources management Information technology Security measures Electronic books Erscheint auch als Druck-Ausgabe Fitzgerald, Todd Information security governance simplified Boca Raton : CRC Press, 2011 9781439811634 https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=411946 Verlag kostenfrei Volltext data file rda |
spellingShingle | Fitzgerald, Todd Information security governance simplified from the boardroom to the keyboard Ch. 1. Getting information security right : top to bottom -- ch. 2. Developing information security strategy -- ch. 3. Defining the security management organization -- ch. 4. Interacting with the C-suite -- ch. 5. Managing risk to an acceptable level -- ch. 6. Creating effective information security policies -- ch. 7. Security compliance using control frameworks -- ch. 8. Managerial controls : practical security considerations -- ch. 9. Technical controls : practical security considerations -- ch. 10. Operational controls : practical security considerations -- ch. 11. The auditors have arrived, now what? -- ch. 12. Effective security communications -- ch. 13. The law and information security -- ch. 14. Learning from information security incidents -- ch. 15. 17 ways to dismantle information security governance efforts BUSINESS & ECONOMICS Commerce Business intelligence COMPUTERS Information Technology COMPUTERS Internet COMPUTERS Networking COMPUTERS Security Information networks Security measures Information resources management Information technology Security measures |
title | Information security governance simplified from the boardroom to the keyboard |
title_auth | Information security governance simplified from the boardroom to the keyboard |
title_exact_search | Information security governance simplified from the boardroom to the keyboard |
title_exact_search_txtP | Information security governance simplified from the boardroom to the keyboard |
title_full | Information security governance simplified from the boardroom to the keyboard Todd Fitzgerald |
title_fullStr | Information security governance simplified from the boardroom to the keyboard Todd Fitzgerald |
title_full_unstemmed | Information security governance simplified from the boardroom to the keyboard Todd Fitzgerald |
title_short | Information security governance simplified |
title_sort | information security governance simplified from the boardroom to the keyboard |
title_sub | from the boardroom to the keyboard |
topic | BUSINESS & ECONOMICS Commerce Business intelligence COMPUTERS Information Technology COMPUTERS Internet COMPUTERS Networking COMPUTERS Security Information networks Security measures Information resources management Information technology Security measures |
topic_facet | BUSINESS & ECONOMICS Business intelligence COMPUTERS Information networks Information resources management Information technology Information networks Security measures Information technology Security measures |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=411946 |
work_keys_str_mv | AT fitzgeraldtodd informationsecuritygovernancesimplifiedfromtheboardroomtothekeyboard |