Once More Unto the Breach :: Mangaging Information Security in an Uncertain World.
The role of the information security manager has changed. Have you? The challenges you face as an information security manager (ISM) have increased enormously since the first edition of Once more unto the breach was published. What seemed exceptional in 2011 is the norm in 2015: vulnerabilities have...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
United Kingdom :
IT Governance Publishing,
2015.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | The role of the information security manager has changed. Have you? The challenges you face as an information security manager (ISM) have increased enormously since the first edition of Once more unto the breach was published. What seemed exceptional in 2011 is the norm in 2015: vulnerabilities have been experienced across all operating systems, millions of individuals have been affected by data breaches, and countless well-known companies have fallen victim to cyber attacks. It's your duty to ensure that your organization isn't next. The ISM's information security responsibilities now cover all aspects of the organization and its operations, and relate to the security of information in all forms, locations, and transactions across the organization - and beyond. Topics covered include: Project management Physical security Password management Consumerization (BYOD) Audit log management Vulnerability management Cloud computing Incident reporting Penetration testing Linking information security with records management Privacy impact assessments Internal auditing In this revised edition of Once more unto the breach, Andrea C Simmons uses her extensive experience to provide an important insight into the changing role and responsibilities of the ISM, walking you through a typical ISM's year and highlighting the challenges and pitfalls of an information security program. One of the key failures of security change management is that it is perceived as a project instead of a program, and is therefore mistakenly assumed to have an end. Once more unto the breach explains why information security is an ongoing process, using the role of project manager on a program of change to highlight the various incidents and issues that arise on an almost daily basis - and often go unnoticed. A major challenge for the ISM is achieving all-important buy-in from their colleagues. Once more unto the breach explains how to express the importance of the tasks you are undertaking in language that executive management will understand. You'll also discover the importance of having a camera with you at all times. For too long, security has been seen as more of an inhibitor than an enabler. Once more unto the breach is an invaluable resource that will help you improve this perception, and achieve better overall information protection results as a result. About the author Andrea C Simmons is an information governance specialist with extensive experience in the private... |
Beschreibung: | 1 online resource |
ISBN: | 9781849287098 1849287090 9781849287081 1849287082 9781849287111 1849287112 |
Internformat
MARC
LEADER | 00000cam a2200000Mi 4500 | ||
---|---|---|---|
001 | ZDB-4-EBU-on1076790184 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr unu|||||||| | ||
008 | 180907s2015 enk o 000 0 eng d | ||
040 | |a LVT |b eng |e pn |c LVT |d OCLCQ |d N$T |d OCLCF |d ERF |d OCLCO |d K6U |d OCLCQ |d OCLCO | ||
020 | |a 9781849287098 |q (online) | ||
020 | |a 1849287090 | ||
020 | |a 9781849287081 | ||
020 | |a 1849287082 | ||
020 | |a 9781849287111 |q (electronic bk.) | ||
020 | |a 1849287112 |q (electronic bk.) | ||
035 | |a (OCoLC)1076790184 | ||
050 | 4 | |a HF5548.37 | |
082 | 7 | |a 658.4/78 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Simmons, Andrea C. |0 http://id.loc.gov/authorities/names/nb2009023163 | |
245 | 1 | 0 | |a Once More Unto the Breach : |b Mangaging Information Security in an Uncertain World. |
260 | |a United Kingdom : |b IT Governance Publishing, |c 2015. | ||
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
520 | |a The role of the information security manager has changed. Have you? The challenges you face as an information security manager (ISM) have increased enormously since the first edition of Once more unto the breach was published. What seemed exceptional in 2011 is the norm in 2015: vulnerabilities have been experienced across all operating systems, millions of individuals have been affected by data breaches, and countless well-known companies have fallen victim to cyber attacks. It's your duty to ensure that your organization isn't next. The ISM's information security responsibilities now cover all aspects of the organization and its operations, and relate to the security of information in all forms, locations, and transactions across the organization - and beyond. Topics covered include: Project management Physical security Password management Consumerization (BYOD) Audit log management Vulnerability management Cloud computing Incident reporting Penetration testing Linking information security with records management Privacy impact assessments Internal auditing In this revised edition of Once more unto the breach, Andrea C Simmons uses her extensive experience to provide an important insight into the changing role and responsibilities of the ISM, walking you through a typical ISM's year and highlighting the challenges and pitfalls of an information security program. One of the key failures of security change management is that it is perceived as a project instead of a program, and is therefore mistakenly assumed to have an end. Once more unto the breach explains why information security is an ongoing process, using the role of project manager on a program of change to highlight the various incidents and issues that arise on an almost daily basis - and often go unnoticed. A major challenge for the ISM is achieving all-important buy-in from their colleagues. Once more unto the breach explains how to express the importance of the tasks you are undertaking in language that executive management will understand. You'll also discover the importance of having a camera with you at all times. For too long, security has been seen as more of an inhibitor than an enabler. Once more unto the breach is an invaluable resource that will help you improve this perception, and achieve better overall information protection results as a result. About the author Andrea C Simmons is an information governance specialist with extensive experience in the private... | ||
650 | 0 | |a Business enterprises |x Information technology |x Security measures. | |
650 | 0 | |a Business enterprises |x Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh95010367 | |
650 | 0 | |a Information technology |x Security measures. | |
650 | 0 | |a Computer security |x Management. | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 0 | |a Data protection. |0 http://id.loc.gov/authorities/subjects/sh85035859 | |
650 | 6 | |a Entreprises |x Technologie de l'information |x Sécurité |x Mesures. | |
650 | 6 | |a Technologie de l'information |x Sécurité |x Mesures. | |
650 | 6 | |a Sécurité informatique |x Gestion. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Protection de l'information (Informatique) | |
650 | 7 | |a Business enterprises |x Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |x Management |2 fast | |
650 | 7 | |a Data protection |2 fast | |
650 | 7 | |a Information technology |x Security measures |2 fast | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBU |q FWS_PDA_EBU |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=957893 |3 Volltext |
938 | |a EBSCOhost |b EBSC |n 957893 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBU | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBU-on1076790184 |
---|---|
_version_ | 1816796932595515392 |
adam_text | |
any_adam_object | |
author | Simmons, Andrea C. |
author_GND | http://id.loc.gov/authorities/names/nb2009023163 |
author_facet | Simmons, Andrea C. |
author_role | |
author_sort | Simmons, Andrea C. |
author_variant | a c s ac acs |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HF5548 |
callnumber-raw | HF5548.37 |
callnumber-search | HF5548.37 |
callnumber-sort | HF 45548.37 |
callnumber-subject | HF - Commerce |
collection | ZDB-4-EBU |
ctrlnum | (OCoLC)1076790184 |
dewey-full | 658.4/78 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/78 |
dewey-search | 658.4/78 |
dewey-sort | 3658.4 278 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04813cam a2200553Mi 4500</leader><controlfield tag="001">ZDB-4-EBU-on1076790184</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr unu||||||||</controlfield><controlfield tag="008">180907s2015 enk o 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">LVT</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">LVT</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCF</subfield><subfield code="d">ERF</subfield><subfield code="d">OCLCO</subfield><subfield code="d">K6U</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849287098</subfield><subfield code="q">(online)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849287090</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849287081</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849287082</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849287111</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849287112</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1076790184</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HF5548.37</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">658.4/78</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Simmons, Andrea C.</subfield><subfield code="0">http://id.loc.gov/authorities/names/nb2009023163</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Once More Unto the Breach :</subfield><subfield code="b">Mangaging Information Security in an Uncertain World.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">United Kingdom :</subfield><subfield code="b">IT Governance Publishing,</subfield><subfield code="c">2015.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The role of the information security manager has changed. Have you? The challenges you face as an information security manager (ISM) have increased enormously since the first edition of Once more unto the breach was published. What seemed exceptional in 2011 is the norm in 2015: vulnerabilities have been experienced across all operating systems, millions of individuals have been affected by data breaches, and countless well-known companies have fallen victim to cyber attacks. It's your duty to ensure that your organization isn't next. The ISM's information security responsibilities now cover all aspects of the organization and its operations, and relate to the security of information in all forms, locations, and transactions across the organization - and beyond. Topics covered include: Project management Physical security Password management Consumerization (BYOD) Audit log management Vulnerability management Cloud computing Incident reporting Penetration testing Linking information security with records management Privacy impact assessments Internal auditing In this revised edition of Once more unto the breach, Andrea C Simmons uses her extensive experience to provide an important insight into the changing role and responsibilities of the ISM, walking you through a typical ISM's year and highlighting the challenges and pitfalls of an information security program. One of the key failures of security change management is that it is perceived as a project instead of a program, and is therefore mistakenly assumed to have an end. Once more unto the breach explains why information security is an ongoing process, using the role of project manager on a program of change to highlight the various incidents and issues that arise on an almost daily basis - and often go unnoticed. A major challenge for the ISM is achieving all-important buy-in from their colleagues. Once more unto the breach explains how to express the importance of the tasks you are undertaking in language that executive management will understand. You'll also discover the importance of having a camera with you at all times. For too long, security has been seen as more of an inhibitor than an enabler. Once more unto the breach is an invaluable resource that will help you improve this perception, and achieve better overall information protection results as a result. About the author Andrea C Simmons is an information governance specialist with extensive experience in the private...</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business enterprises</subfield><subfield code="x">Information technology</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh95010367</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information technology</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Management.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85035859</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Entreprises</subfield><subfield code="x">Technologie de l'information</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Technologie de l'information</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique</subfield><subfield code="x">Gestion.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Protection de l'information (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="x">Management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBU</subfield><subfield code="q">FWS_PDA_EBU</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=957893</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">957893</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBU</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBU-on1076790184 |
illustrated | Not Illustrated |
indexdate | 2024-11-26T14:49:32Z |
institution | BVB |
isbn | 9781849287098 1849287090 9781849287081 1849287082 9781849287111 1849287112 |
language | English |
oclc_num | 1076790184 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource |
psigel | ZDB-4-EBU |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | IT Governance Publishing, |
record_format | marc |
spelling | Simmons, Andrea C. http://id.loc.gov/authorities/names/nb2009023163 Once More Unto the Breach : Mangaging Information Security in an Uncertain World. United Kingdom : IT Governance Publishing, 2015. 1 online resource text txt rdacontent computer c rdamedia online resource cr rdacarrier The role of the information security manager has changed. Have you? The challenges you face as an information security manager (ISM) have increased enormously since the first edition of Once more unto the breach was published. What seemed exceptional in 2011 is the norm in 2015: vulnerabilities have been experienced across all operating systems, millions of individuals have been affected by data breaches, and countless well-known companies have fallen victim to cyber attacks. It's your duty to ensure that your organization isn't next. The ISM's information security responsibilities now cover all aspects of the organization and its operations, and relate to the security of information in all forms, locations, and transactions across the organization - and beyond. Topics covered include: Project management Physical security Password management Consumerization (BYOD) Audit log management Vulnerability management Cloud computing Incident reporting Penetration testing Linking information security with records management Privacy impact assessments Internal auditing In this revised edition of Once more unto the breach, Andrea C Simmons uses her extensive experience to provide an important insight into the changing role and responsibilities of the ISM, walking you through a typical ISM's year and highlighting the challenges and pitfalls of an information security program. One of the key failures of security change management is that it is perceived as a project instead of a program, and is therefore mistakenly assumed to have an end. Once more unto the breach explains why information security is an ongoing process, using the role of project manager on a program of change to highlight the various incidents and issues that arise on an almost daily basis - and often go unnoticed. A major challenge for the ISM is achieving all-important buy-in from their colleagues. Once more unto the breach explains how to express the importance of the tasks you are undertaking in language that executive management will understand. You'll also discover the importance of having a camera with you at all times. For too long, security has been seen as more of an inhibitor than an enabler. Once more unto the breach is an invaluable resource that will help you improve this perception, and achieve better overall information protection results as a result. About the author Andrea C Simmons is an information governance specialist with extensive experience in the private... Business enterprises Information technology Security measures. Business enterprises Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh95010367 Information technology Security measures. Computer security Management. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Data protection. http://id.loc.gov/authorities/subjects/sh85035859 Entreprises Technologie de l'information Sécurité Mesures. Technologie de l'information Sécurité Mesures. Sécurité informatique Gestion. Réseaux d'ordinateurs Sécurité Mesures. Protection de l'information (Informatique) Business enterprises Computer networks Security measures fast Computer networks Security measures fast Computer security Management fast Data protection fast Information technology Security measures fast FWS01 ZDB-4-EBU FWS_PDA_EBU https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=957893 Volltext |
spellingShingle | Simmons, Andrea C. Once More Unto the Breach : Mangaging Information Security in an Uncertain World. Business enterprises Information technology Security measures. Business enterprises Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh95010367 Information technology Security measures. Computer security Management. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Data protection. http://id.loc.gov/authorities/subjects/sh85035859 Entreprises Technologie de l'information Sécurité Mesures. Technologie de l'information Sécurité Mesures. Sécurité informatique Gestion. Réseaux d'ordinateurs Sécurité Mesures. Protection de l'information (Informatique) Business enterprises Computer networks Security measures fast Computer networks Security measures fast Computer security Management fast Data protection fast Information technology Security measures fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh95010367 http://id.loc.gov/authorities/subjects/sh94001277 http://id.loc.gov/authorities/subjects/sh85035859 |
title | Once More Unto the Breach : Mangaging Information Security in an Uncertain World. |
title_auth | Once More Unto the Breach : Mangaging Information Security in an Uncertain World. |
title_exact_search | Once More Unto the Breach : Mangaging Information Security in an Uncertain World. |
title_full | Once More Unto the Breach : Mangaging Information Security in an Uncertain World. |
title_fullStr | Once More Unto the Breach : Mangaging Information Security in an Uncertain World. |
title_full_unstemmed | Once More Unto the Breach : Mangaging Information Security in an Uncertain World. |
title_short | Once More Unto the Breach : |
title_sort | once more unto the breach mangaging information security in an uncertain world |
title_sub | Mangaging Information Security in an Uncertain World. |
topic | Business enterprises Information technology Security measures. Business enterprises Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh95010367 Information technology Security measures. Computer security Management. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Data protection. http://id.loc.gov/authorities/subjects/sh85035859 Entreprises Technologie de l'information Sécurité Mesures. Technologie de l'information Sécurité Mesures. Sécurité informatique Gestion. Réseaux d'ordinateurs Sécurité Mesures. Protection de l'information (Informatique) Business enterprises Computer networks Security measures fast Computer networks Security measures fast Computer security Management fast Data protection fast Information technology Security measures fast |
topic_facet | Business enterprises Information technology Security measures. Business enterprises Computer networks Security measures. Information technology Security measures. Computer security Management. Computer networks Security measures. Data protection. Entreprises Technologie de l'information Sécurité Mesures. Technologie de l'information Sécurité Mesures. Sécurité informatique Gestion. Réseaux d'ordinateurs Sécurité Mesures. Protection de l'information (Informatique) Business enterprises Computer networks Security measures Computer networks Security measures Computer security Management Data protection Information technology Security measures |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=957893 |
work_keys_str_mv | AT simmonsandreac oncemoreuntothebreachmangaginginformationsecurityinanuncertainworld |