The CISO Handbook: A Practical Guide to Securing Your CompanyCRC Press, 2016 M04 19 - 352 páginas The CISO Handbook: A Practical Guide to Securing Your Company provides unique insights and guidance into designing and implementing an information security program, delivering true value to the stakeholders of a company. The authors present several essential high-level concepts before building a robust framework that will enable you to map the conc |
Dentro del libro
Resultados 1-5 de 23
Página
... critical areas addressed in this chapter include capital budgeting, resource planning, and project scheduling. Some ... skills and execution tactics you will need to ensure that the projects you have won management's support for actually get ...
... critical areas addressed in this chapter include capital budgeting, resource planning, and project scheduling. Some ... skills and execution tactics you will need to ensure that the projects you have won management's support for actually get ...
Página 1
... critical information as quickly and efficiently as possible. You're attempting to get the big picture, which will provide insight into the very reasons you ... Critical Skills Consultative Sales Skills Most people see security as 1. Assess.
... critical information as quickly and efficiently as possible. You're attempting to get the big picture, which will provide insight into the very reasons you ... Critical Skills Consultative Sales Skills Most people see security as 1. Assess.
Página 2
... Critical Skills Consultative Sales Skills Most people see security as a cost center, not a profit center. This perception almost automatically places you in the unenviable position of constantly having to sell the virtues and benefits ...
... Critical Skills Consultative Sales Skills Most people see security as a cost center, not a profit center. This perception almost automatically places you in the unenviable position of constantly having to sell the virtues and benefits ...
Página 3
... skills can help you in the implementation of your information security program. A number of excellent reference books that have helped us on this topic can be found in the Appendix. Critical Knowledge In this section, we will identify ...
... skills can help you in the implementation of your information security program. A number of excellent reference books that have helped us on this topic can be found in the Appendix. Critical Knowledge In this section, we will identify ...
Página 48
Alcanzaste el límite de visualización de este libro.
Alcanzaste el límite de visualización de este libro.
Contenido
1 | |
2 Plan | 48 |
3 Design | 94 |
4 Execute | 137 |
5 Report | 186 |
6 The Final Phase | 228 |
Appendix A | 231 |
Appendix B | 235 |
Appendix C | 239 |
Appendix D | 243 |
Appendix E | 267 |
Index | 268 |
Otras ediciones - Ver todas
The CISO Handbook: A Practical Guide to Securing Your Company Michael Gentile,Ron Collette,Thomas D. August Vista previa limitada - 2016 |
The CISO Handbook: A PRACTICAL GUIDE TO SECURING YOUR COMPANY Michael Gentile,Ron Collette,Thomas D. August Sin vista previa disponible - 2005 |
The CISO Handbook: A Practical Guide to Securing Your Company Michael Gentile,Ron Collette,Thomas August Sin vista previa disponible - 2015 |
Términos y frases comunes
ability accomplish applicable areas assessment checklist associated attributes budget build business requirements chapter CISSP complete compliance create critical skills critical success factors customers defined definition delivery desired reaction determine discuss effective elements employees ensure enterprise enterprise’s establish evaluation example executive management Figure focus formal foundation concepts functional requirements Gantt chart gap analysis goal guidelines HIPAA identify impact implementation individual industry information security officer information security policies information security program initiatives intent internal audit internal controls ISBN issues layers Let’s marketing mission statement non-operational objective operating system operational teams organization perform potential present procedures project requirements RACF responsibilities result risk analysis role Scenario schedule scope SDLC security professionals security project portfolio security requirements SecurityFocus sell solution specific staff stakeholders standards strategic structure technical environment types of projects understand various vendors
Pasajes populares
Página 32 - Associate yourself with men of good quality, if you esteem your own reputation : for it is better to be alone, than in bad company.
Página 63 - SANS is the most trusted and by far the largest source for information security training and certification in the world. It also develops, maintains, and makes available at no cost, the largest collection of research documents about various aspects of information security, and it operates the Internet's early warning system - Internet Storm Center.
Página 108 - When dealing with people, remember you are not dealing with creatures of logic, but with creatures of emotion, creatures bristling with prejudice and motivated by pride and vanity.
Página 117 - JUST as the constant increase of entropy is the basic law of the universe, so it is the basic law of life to be ever more highly structured and to struggle against entropy. Life rebels against all uniformity and levelling; its aim is not sameness but variety, the restlessness of transcendence, the adventure of novelty and rebellion against the status quo.
Página 61 - The first method for estimating the intelligence of a ruler is to look at the men he has around him.
Página 63 - The SANS Institute enables more than 156,000 security professionals, auditors, system administrators, and network administrators to share the lessons it is learning and find solutions to the challenges it faces.
Página 230 - All speech, written or spoken, is a dead language, until it finds a willing and prepared hearer.
Página 95 - People who work together will win, whether it be against complex football defenses, or the problems of modern society.