The CISO Handbook: A Practical Guide to Securing Your CompanyCRC Press, 2016 M04 19 - 352 páginas The CISO Handbook: A Practical Guide to Securing Your Company provides unique insights and guidance into designing and implementing an information security program, delivering true value to the stakeholders of a company. The authors present several essential high-level concepts before building a robust framework that will enable you to map the conc |
Dentro del libro
Resultados 1-5 de 40
Página
... project scheduling. Some of the key deliverables you should be able to complete after ... projects to be completed in order to successfully implement your program ... types of project failures and how to prevent them, how to establish ...
... project scheduling. Some of the key deliverables you should be able to complete after ... projects to be completed in order to successfully implement your program ... types of project failures and how to prevent them, how to establish ...
Página
... projects. Report This chapter focuses on the reporting process for both external and internal stakeholders of your program. We discuss the various types of audiences, their needs, successful strategies for reporting to them, the types ...
... projects. Report This chapter focuses on the reporting process for both external and internal stakeholders of your program. We discuss the various types of audiences, their needs, successful strategies for reporting to them, the types ...
Página 5
... types of projects or which sponsors typically have the most success in being funded? □ How far in advance should ... types, and forms. Some of the more well-known terms used to describe risks facing today's enterprises include business ...
... types of projects or which sponsors typically have the most success in being funded? □ How far in advance should ... types, and forms. Some of the more well-known terms used to describe risks facing today's enterprises include business ...
Página 11
... projects and initiatives are supposed to be happening but consistently aren't. We think of them as the defenders of ... kind presents a threat to obstructionists, they'll often do whatever they can to resist or obstruct the ...
... projects and initiatives are supposed to be happening but consistently aren't. We think of them as the defenders of ... kind presents a threat to obstructionists, they'll often do whatever they can to resist or obstruct the ...
Página 70
Alcanzaste el límite de visualización de este libro.
Alcanzaste el límite de visualización de este libro.
Contenido
1 | |
2 Plan | 48 |
3 Design | 94 |
4 Execute | 137 |
5 Report | 186 |
6 The Final Phase | 228 |
Appendix A | 231 |
Appendix B | 235 |
Appendix C | 239 |
Appendix D | 243 |
Appendix E | 267 |
Index | 268 |
Otras ediciones - Ver todas
The CISO Handbook: A Practical Guide to Securing Your Company Michael Gentile,Ron Collette,Thomas D. August Vista previa limitada - 2016 |
The CISO Handbook: A PRACTICAL GUIDE TO SECURING YOUR COMPANY Michael Gentile,Ron Collette,Thomas D. August Sin vista previa disponible - 2005 |
The CISO Handbook: A Practical Guide to Securing Your Company Michael Gentile,Ron Collette,Thomas August Sin vista previa disponible - 2015 |
Términos y frases comunes
ability accomplish applicable areas assessment checklist associated attributes budget build business requirements chapter CISSP complete compliance create critical skills critical success factors customers defined definition delivery desired reaction determine discuss effective elements employees ensure enterprise enterprise’s establish evaluation example executive management Figure focus formal foundation concepts functional requirements Gantt chart gap analysis goal guidelines HIPAA identify impact implementation individual industry information security officer information security policies information security program initiatives intent internal audit internal controls ISBN issues layers Let’s marketing mission statement non-operational objective operating system operational teams organization perform potential present procedures project requirements RACF responsibilities result risk analysis role Scenario schedule scope SDLC security professionals security project portfolio security requirements SecurityFocus sell solution specific staff stakeholders standards strategic structure technical environment types of projects understand various vendors
Pasajes populares
Página 32 - Associate yourself with men of good quality, if you esteem your own reputation : for it is better to be alone, than in bad company.
Página 63 - SANS is the most trusted and by far the largest source for information security training and certification in the world. It also develops, maintains, and makes available at no cost, the largest collection of research documents about various aspects of information security, and it operates the Internet's early warning system - Internet Storm Center.
Página 108 - When dealing with people, remember you are not dealing with creatures of logic, but with creatures of emotion, creatures bristling with prejudice and motivated by pride and vanity.
Página 117 - JUST as the constant increase of entropy is the basic law of the universe, so it is the basic law of life to be ever more highly structured and to struggle against entropy. Life rebels against all uniformity and levelling; its aim is not sameness but variety, the restlessness of transcendence, the adventure of novelty and rebellion against the status quo.
Página 61 - The first method for estimating the intelligence of a ruler is to look at the men he has around him.
Página 63 - The SANS Institute enables more than 156,000 security professionals, auditors, system administrators, and network administrators to share the lessons it is learning and find solutions to the challenges it faces.
Página 230 - All speech, written or spoken, is a dead language, until it finds a willing and prepared hearer.
Página 95 - People who work together will win, whether it be against complex football defenses, or the problems of modern society.