feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    almahu_9949369699202882
    Format: xxviii, 381 p. : , ill., port.
    Edition: Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.
    ISBN: 9781439811658 (electronic bk.)
    Content: "Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure.Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations"--
    Note: "An Auerbach book."
    Language: English
    Keywords: Electronic books. ; Electronic books
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    gbv_1778720609
    Format: 1 Online-Ressource (433 p.)
    Content: Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure. Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn’t when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations
    Note: English
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Milton : Auerbach Publishers, Incorporated
    UID:
    b3kat_BV046686321
    Format: 1 online resource (577 pages)
    ISBN: 9780429677847
    Note: Description based on publisher supplied metadata and other sources
    Additional Edition: Erscheint auch als Druck-Ausgabe Fitzgerald, Todd Ciso Compass : Navigating Cybersecurity Leadership Challenges with Insights from Pioneers Milton : Auerbach Publishers, Incorporated,c2018 ISBN 9781498740449
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    almahu_9949641580302882
    Format: 1 online resource
    ISBN: 9780429399015 , 0429399014 , 9780429677830 , 0429677839
    Additional Edition: Print version: CISO compass New York : CRC Press, [2019] ISBN 9781498740449 (hb : alk. paper)
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Baton Rouge : Taylor and Francis Group
    UID:
    kobvindex_INT71197
    Format: 1 online resource (432 pages)
    Edition: 1st ed.
    ISBN: 9781439811634 , 9781439811658
    Content: Todd Fitzgerald's new book, Information Security Governance Simplified: From the Boardroom to the Keyboard, presents 15 chapters of advice and real-world experience on how to handle the roll out of an effective program .... Todd has taken the time to include for the reader some practical security considerations for managerial, technical, and operational controls. This is followed up with a discussion on how legal issues are impacting the information security program.-Tom Peltier, CISSP
    Note: Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- Foreword -- Acknowledgments -- Introduction -- About the Author -- Chapter 1 Getting Information Security Right: Top to Bottom -- Information Security Governance -- Tone at the Top -- Tone at the Bottom -- Governance, Risk, and Compliance (GRC) -- The Compliance Dilemma -- Suggested Reading -- Chapter 2 Developing Information Security Strategy -- Evolution of Information Security -- Organization Historical Perspective -- Fear, Uncertainty, Doubt, Fear, Uncertainty, Doubt -- Understand the External Environment -- Regulatory -- Competition -- Emerging Threats -- Technology Cost Changes -- External Independent Research -- The Internal Company Culture -- Risk Appetite -- Speed -- Collaborative versus Authoritative -- Trust Level -- Growth Seeker or Cost Cutter -- Company Size -- Outsourcing Posture -- Prior Security Incidents, Audits -- Security Strategy Development Techniques -- Mind Mapping -- SWOT Analysis -- Balanced Scorecard -- Face-to-Face Interviews -- Security Planning -- Strategic -- Tactical -- Operational/Project Plans -- Suggested Reading -- Chapter 3 Defining the Security Management Organization -- History of the Security Leadership Role Is Relevant -- The New Security Officer Mandate -- Day 1: Hey, I Got the Job! -- Security Leader Titles -- Techie versus Leader -- The Security Leaders Library -- Security Leadership Defined -- Security Leader Soft Skills -- Seven Competencies for Effective Security Leadership -- Security Functions -- Learning from Leading Organizations -- Assess Risk and Determine Needs -- Implement Policies and Controls -- Promote Awareness -- Monitor and Evaluate -- Central Management -- What Functions Should the Security Officer Be Responsible For? -- Assessing Risk and Determining Needs Functions -- Risk Assessment/Analysis , "-Inging" the Council: Forming, Storming, Norming, and Performing -- Forming -- Storming -- Norming -- Performing -- Integration with Other Committees -- Establish Early, Incremental Success -- Let Go of Perfectionism -- Sustaining the Security Council -- End User Awareness -- Security Council Commitment -- Suggested Reading -- Chapter 5 Managing Risk to an Acceptable Level -- Risk in Our Daily Lives -- Accepting Organizational Risk -- Just Another Set of Risks -- Management Owns the Risk Decision -- Qualitative versus Quantitative Risk Analysis -- Risk Management Process -- Risk Analysis Involvement -- Step 1: Categorize the System -- Step 2: Identify Potential Dangers (Threats) -- Human Threats -- Environmental/Physical Threats -- Technical Threats -- Step 3: Identify Vulnerabilities That Could Be Exploited -- Step 4: Identify Existing Controls -- Step 5: Determine Exploitation Likelihood Given Existing Controls -- Step 6: Determine Impact Severity -- Step 7: Determine Risk Level -- Step 8: Determine Additional Controls -- Risk Mitigation Options -- Risk Assumption -- Risk Avoidance -- Risk Limitation -- Risk Planning -- Risk Research -- Risk Transference -- Conclusion -- Suggested Reading -- Chapter 6 Creating Effective Information Security Policies -- Why Information Security Policies Are Important -- Avoiding Shelfware -- Electronic Policy Distribution -- Canned Security Policies -- Policies, Standards, Guidelines Definitions -- Policies Are Written at a High Level -- Policies -- Security Policy Best Practices -- Types of Security Policies -- Standards -- Procedures -- Baselines -- Guidelines -- Combination of Policies, Standards, Baselines, Procedures, and Guidelines -- Policy Analogy -- An Approach for Developing Information Security Policies -- Utilizing the Security Council for Policies -- The Policy Review Process , Information Security Policy Process -- Suggested Reading -- Chapter 7 Security Compliance Using Control Frameworks -- Security Control Frameworks Defined -- Security Control Frameworks and Standards Examples -- Heath Insurance Portability and Accountability Act (HIPAA) -- Federal Information Security Management Act of 2002 (FISMA) -- National Institute of Standards and Technology (NIST) Recommended Security Controls for Federal Information Systems (800-53) -- Federal Information System Controls Audit Manual (FISCAM) -- ISO/IEC 27001:2005 Information Security Management Systems-Requirements -- ISO/IEC 27002:2005 Information Technology-Security Techniques-Code of Practice for Information Security Management -- Control Objectives for Information and Related Technology (COBIT) -- Payment Card Industry Data Security Standard (PCI DSS) -- Information Technology Infrastructure Library (ITIL) -- Security Technical Implementation Guides (STIGs) and National Security Agency (NSA) Guides -- Federal Financial Institutions Examination Council (FFIEC) IT Examination Handbook -- The World Operates on Standards -- Standards Are Dynamic -- The How Is Typically Left Up to Us -- Key Question: Why Does the Standard Exist? -- Compliance Is Not Security, But It Is a Good Start -- Integration of Standards and Control Frameworks -- Auditing Compliance -- Adoption Rate of Various Standards -- ISO 27001/2 Certification -- NIST Certification -- Control Framework Convergence -- The 11-Factor Compliance Assurance Manifesto -- The Standards/Framework Value Proposition -- Suggested Reading -- Chapter 8 Managerial Controls: Practical Security Considerations -- Security Control Convergence -- Security Control Methodology -- Security Assessment and Authorization Controls -- Planning Controls -- Risk Assessment Controls -- System and Services Acquisition Controls , Organizational Changes , Program Management Controls -- Suggested Reading -- Chapter 9 Technical Controls: Practical Security Considerations -- Access Control Controls -- Audit and Accountability Controls -- Identification and Authentication -- System and Communications Protections -- Suggested Reading -- Chapter 10 Operational Controls: Practical Security Considerations -- Awareness and Training Controls -- Configuration Management Controls -- Contingency Planning Controls -- Incident Response Controls -- Maintenance Controls -- Media Protection Controls -- Physical and Environmental Protection Controls -- Personnel Security Controls -- System and Information Integrity Controls -- Suggested Reading -- Chapter 11 The Auditors Have Arrived, Now What? -- Anatomy of an Audit -- Audit Planning Phase -- Preparation of Document Request List -- Gather Audit Artifacts -- Provide Information to Auditors -- On-Site Arrival Phase -- Internet Access -- Reserve Conference Rooms -- Physical Access -- Conference Phones -- Schedule Entrance, Exit, Status Meetings -- Set Up Interviews -- Audit Execution Phase -- Additional Audit Meetings -- Establish Auditor Communication Protocol -- Establish Internal Company Protocol -- Media Handling -- Audit Coordinator Quality Review -- The Interview Itself -- Entrance, Exit, and Status Conferences -- Entrance Meeting -- Exit Meeting -- Status Meetings -- Report Issuance and Finding Remediation Phase -- Suggested Reading -- Chapter 12 Effective Security Communications -- Why a Chapter Dedicated to Security Communications? -- End User Security Awareness Training -- Awareness Definition -- Delivering the Message -- Step 1: Security Awareness Needs Assessment -- New or Changed Policies -- Past Security Incidents -- Systems Security Plans -- Audit Findings and Recommendations -- Event Analysis -- Industry Trends -- Management Concerns , Systems Security Plan Development -- External Penetration Testing -- Implement Policies and Control Functions -- Security Policy Development -- Security Architecture -- Security Control Assessment -- Identity and Access Management -- Business Continuity and Disaster Recovery -- Promote Awareness Functions -- End User Security Awareness Training -- Intranet Site and Policy Publication -- Targeted Awareness -- Monitor and Evaluate Functions -- Security Baseline Configuration Review -- Logging and Monitoring -- Vulnerability Assessment -- Internet Monitoring/Management of Managed Services -- Incident Response -- Forensic Investigations -- Central Management Functions -- Reporting Model -- Business Relationships -- Reporting to the CEO -- Reporting to the Information Systems Department -- Reporting to Corporate Security -- Reporting to the Administrative Services Department -- Reporting to the Insurance and Risk Management Department -- Reporting to the Internal Audit Department -- Reporting to the Legal Department -- Determining the Best Fit -- Suggested Reading -- Chapter 4 Interacting with the C-Suite -- Communication between the CEO, CIO, Other Executives, and CISO -- 13 "Lucky" Questions to Ask One Another -- The CEO, Ultimate Decision Maker -- The CEO Needs to Know Why -- The CIO, Where Technology Meets the Business -- CIO's Commitment to Security Is Important -- The Security Officer, Protecting the Business -- The CEO, CIO, and CISO Are Business Partners -- Building Grassroots Support through an Information Security Council -- Establishing the Security Council -- Oversight of Security Program -- Decide on Project Initiatives -- Prioritize Information Security Efforts -- Review and Recommend Security Policies -- Champion Organizational Security Efforts -- Recommend Areas Requiring Investment -- Appropriate Security Council Representation
    Additional Edition: Print version Fitzgerald, Todd Information Security Governance Simplified Baton Rouge : Taylor & Francis Group,c2011 ISBN 9781439811634
    Language: English
    Keywords: Electronic books
    URL: FULL  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    edoccha_9961519262802883
    Format: 1 online resource (433 pages)
    Content: Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure. Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations.
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    almahu_9949736997502882
    Format: 1 online resource (433 pages)
    Content: Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure. Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations.
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    edocfu_9961519262802883
    Format: 1 online resource (433 pages)
    Content: Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure. Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations.
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    almahu_9949641828502882
    Format: 1 online resource
    ISBN: 9781000994025 , 1000994023 , 9781000994018 , 1000994015 , 9781003383017 , 1003383017
    Content: Congratulations! Perhaps you have been appointed as the Chief Privacy Officer (CPO) or the Data Protection Officer (DPO) for your company. Or maybe you are an experienced CPO/DPO, and you wonder - "what can I learn from other successful privacy experts to be even more effective?" Or perhaps you are considering a move from a different career path and deciding if this is the right direction for you. Seasoned award-winning Privacy and Cybersecurity leaders Dr. Valerie Lyons (Dublin, Ireland) and Todd Fitzgerald (Chicago, IL USA) have teamed up with over 60 award-winning CPOs, DPOs, highly respected privacy/data protection leaders, data protection authorities, and privacy standard setters who have fought the tough battle. Just as the #1 best-selling and CANON Cybersecurity Hall of Fame winning CISO Compass: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers book provided actionable advice to Chief Information Security Officers, The Privacy Leader Compass is about straight talk - delivering a comprehensive privacy roadmap applied to, and organized by, a time-tested organizational effectiveness model (the McKinsey 7-S Framework) with practical, insightful stories and lessons learned. You own your continued success as a privacy leader. If you want a roadmap to build, lead, and sustain a program respected and supported by your board, management, organization, and peers, this book is for you.
    Additional Edition: Print version: ISBN 9781000994025
    Additional Edition: Print version: ISBN 1032467312
    Additional Edition: ISBN 9781032467313
    Additional Edition: ISBN 1032467304
    Additional Edition: ISBN 9781032467306
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    almahu_9948314734802882
    Format: xxviii, 381 p. : , ill., port.
    Edition: Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.
    Content: "Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure.Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations"--
    Note: "An Auerbach book."
    Language: English
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages