The CISO Handbook: A Practical Guide to Securing Your CompanyCRC Press, 2016 M04 19 - 352 páginas The CISO Handbook: A Practical Guide to Securing Your Company provides unique insights and guidance into designing and implementing an information security program, delivering true value to the stakeholders of a company. The authors present several essential high-level concepts before building a robust framework that will enable you to map the conc |
Dentro del libro
Resultados 1-5 de 25
Página 4
... staff, chief financial officer, and sales directors. Here are just a few of the things all of the members of your information security program should know: □ How does your enterprise make money? □ Does your enterprise have any ...
... staff, chief financial officer, and sales directors. Here are just a few of the things all of the members of your information security program should know: □ How does your enterprise make money? □ Does your enterprise have any ...
Página 7
... staff route all incoming mail through it—including the e-mail responses from its direct marketing campaigns. By not understanding SpamCo's main enterprise differentiator, the information security officer managed to negatively impact a ...
... staff route all incoming mail through it—including the e-mail responses from its direct marketing campaigns. By not understanding SpamCo's main enterprise differentiator, the information security officer managed to negatively impact a ...
Página 8
... staff may not have the control infrastructure necessary to support an effective information security program yet. This would be analogous to a soccer coach placing players on the field without assigning positions or informing the ...
... staff may not have the control infrastructure necessary to support an effective information security program yet. This would be analogous to a soccer coach placing players on the field without assigning positions or informing the ...
Página 16
Alcanzaste el límite de visualización de este libro.
Alcanzaste el límite de visualización de este libro.
Página 17
Alcanzaste el límite de visualización de este libro.
Alcanzaste el límite de visualización de este libro.
Contenido
1 | |
2 Plan | 48 |
3 Design | 94 |
4 Execute | 137 |
5 Report | 186 |
6 The Final Phase | 228 |
Appendix A | 231 |
Appendix B | 235 |
Appendix C | 239 |
Appendix D | 243 |
Appendix E | 267 |
Index | 268 |
Otras ediciones - Ver todas
The CISO Handbook: A Practical Guide to Securing Your Company Michael Gentile,Ron Collette,Thomas D. August Vista previa limitada - 2016 |
The CISO Handbook: A PRACTICAL GUIDE TO SECURING YOUR COMPANY Michael Gentile,Ron Collette,Thomas D. August Sin vista previa disponible - 2005 |
The CISO Handbook: A Practical Guide to Securing Your Company Michael Gentile,Ron Collette,Thomas August Sin vista previa disponible - 2015 |
Términos y frases comunes
ability accomplish applicable areas assessment checklist associated attributes budget build business requirements chapter CISSP complete compliance create critical skills critical success factors customers defined definition delivery desired reaction determine discuss effective elements employees ensure enterprise enterprise’s establish evaluation example executive management Figure focus formal foundation concepts functional requirements Gantt chart gap analysis goal guidelines HIPAA identify impact implementation individual industry information security officer information security policies information security program initiatives intent internal audit internal controls ISBN issues layers Let’s marketing mission statement non-operational objective operating system operational teams organization perform potential present procedures project requirements RACF responsibilities result risk analysis role Scenario schedule scope SDLC security professionals security project portfolio security requirements SecurityFocus sell solution specific staff stakeholders standards strategic structure technical environment types of projects understand various vendors
Pasajes populares
Página 32 - Associate yourself with men of good quality, if you esteem your own reputation : for it is better to be alone, than in bad company.
Página 63 - SANS is the most trusted and by far the largest source for information security training and certification in the world. It also develops, maintains, and makes available at no cost, the largest collection of research documents about various aspects of information security, and it operates the Internet's early warning system - Internet Storm Center.
Página 108 - When dealing with people, remember you are not dealing with creatures of logic, but with creatures of emotion, creatures bristling with prejudice and motivated by pride and vanity.
Página 117 - JUST as the constant increase of entropy is the basic law of the universe, so it is the basic law of life to be ever more highly structured and to struggle against entropy. Life rebels against all uniformity and levelling; its aim is not sameness but variety, the restlessness of transcendence, the adventure of novelty and rebellion against the status quo.
Página 61 - The first method for estimating the intelligence of a ruler is to look at the men he has around him.
Página 63 - The SANS Institute enables more than 156,000 security professionals, auditors, system administrators, and network administrators to share the lessons it is learning and find solutions to the challenges it faces.
Página 230 - All speech, written or spoken, is a dead language, until it finds a willing and prepared hearer.
Página 95 - People who work together will win, whether it be against complex football defenses, or the problems of modern society.