The CISO Handbook: A Practical Guide to Securing Your CompanyCRC Press, 2016 M04 19 - 352 páginas The CISO Handbook: A Practical Guide to Securing Your Company provides unique insights and guidance into designing and implementing an information security program, delivering true value to the stakeholders of a company. The authors present several essential high-level concepts before building a robust framework that will enable you to map the conc |
Dentro del libro
Resultados 1-5 de 30
Página
... budgeting, resource planning, and project scheduling. Some of the key deliverables you should be able to complete after ... budget for use in soliciting the financial support necessary for implementing your program Execute This chapter ...
... budgeting, resource planning, and project scheduling. Some of the key deliverables you should be able to complete after ... budget for use in soliciting the financial support necessary for implementing your program Execute This chapter ...
Página 5
... budget cycle? □ Who is involved in the budgeting process and exactly what are they responsible for? □ What types of projects or which sponsors typically have the most success in being funded? □ How far in advance should you begin to ...
... budget cycle? □ Who is involved in the budgeting process and exactly what are they responsible for? □ What types of projects or which sponsors typically have the most success in being funded? □ How far in advance should you begin to ...
Página 11
... budget approval process? □ What is this person's relationship with executive management? If you're new to your organization, this process will require constant diligence until you fully understand the culture, politics, and personality ...
... budget approval process? □ What is this person's relationship with executive management? If you're new to your organization, this process will require constant diligence until you fully understand the culture, politics, and personality ...
Página 18
Alcanzaste el límite de visualización de este libro.
Alcanzaste el límite de visualización de este libro.
Página 29
Alcanzaste el límite de visualización de este libro.
Alcanzaste el límite de visualización de este libro.
Contenido
1 | |
2 Plan | 48 |
3 Design | 94 |
4 Execute | 137 |
5 Report | 186 |
6 The Final Phase | 228 |
Appendix A | 231 |
Appendix B | 235 |
Appendix C | 239 |
Appendix D | 243 |
Appendix E | 267 |
Index | 268 |
Otras ediciones - Ver todas
The CISO Handbook: A Practical Guide to Securing Your Company Michael Gentile,Ron Collette,Thomas D. August Vista previa limitada - 2016 |
The CISO Handbook: A PRACTICAL GUIDE TO SECURING YOUR COMPANY Michael Gentile,Ron Collette,Thomas D. August Sin vista previa disponible - 2005 |
The CISO Handbook: A Practical Guide to Securing Your Company Michael Gentile,Ron Collette,Thomas August Sin vista previa disponible - 2015 |
Términos y frases comunes
ability accomplish applicable areas assessment checklist associated attributes budget build business requirements chapter CISSP complete compliance create critical skills critical success factors customers defined definition delivery desired reaction determine discuss effective elements employees ensure enterprise enterprise’s establish evaluation example executive management Figure focus formal foundation concepts functional requirements Gantt chart gap analysis goal guidelines HIPAA identify impact implementation individual industry information security officer information security policies information security program initiatives intent internal audit internal controls ISBN issues layers Let’s marketing mission statement non-operational objective operating system operational teams organization perform potential present procedures project requirements RACF responsibilities result risk analysis role Scenario schedule scope SDLC security professionals security project portfolio security requirements SecurityFocus sell solution specific staff stakeholders standards strategic structure technical environment types of projects understand various vendors
Pasajes populares
Página 32 - Associate yourself with men of good quality, if you esteem your own reputation : for it is better to be alone, than in bad company.
Página 63 - SANS is the most trusted and by far the largest source for information security training and certification in the world. It also develops, maintains, and makes available at no cost, the largest collection of research documents about various aspects of information security, and it operates the Internet's early warning system - Internet Storm Center.
Página 108 - When dealing with people, remember you are not dealing with creatures of logic, but with creatures of emotion, creatures bristling with prejudice and motivated by pride and vanity.
Página 117 - JUST as the constant increase of entropy is the basic law of the universe, so it is the basic law of life to be ever more highly structured and to struggle against entropy. Life rebels against all uniformity and levelling; its aim is not sameness but variety, the restlessness of transcendence, the adventure of novelty and rebellion against the status quo.
Página 61 - The first method for estimating the intelligence of a ruler is to look at the men he has around him.
Página 63 - The SANS Institute enables more than 156,000 security professionals, auditors, system administrators, and network administrators to share the lessons it is learning and find solutions to the challenges it faces.
Página 230 - All speech, written or spoken, is a dead language, until it finds a willing and prepared hearer.
Página 95 - People who work together will win, whether it be against complex football defenses, or the problems of modern society.