Show simple item record

dc.contributor.authorFitzgerald, Todd
dc.contributor.authorFitzgerald, Todd
dc.contributor.authorPeltier, Tom
dc.date.accessioned2020-07-23T15:34:58Z
dc.date.available2020-07-23T15:34:58Z
dc.date.issued2011
dc.identifierONIX_20200723_9781439811634_13
dc.identifier.urihttps://library.oapen.org/handle/20.500.12657/41772
dc.description.abstractSecurity practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure. Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn’t when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations.
dc.languageEnglish
dc.subject.classificationthema EDItEUR::K Economics, Finance, Business and Management::KC Economics::KCC Microeconomicsen_US
dc.subject.classificationthema EDItEUR::U Computing and Information Technology::UB Information technology: general topicsen_US
dc.subject.classificationthema EDItEUR::U Computing and Information Technology::UR Computer securityen_US
dc.subject.otherIT Security
dc.subject.otherManagement of IT
dc.subject.otherSecurity Services
dc.subject.otherBUSINESS/MANAGEMENT
dc.subject.otherInfoSECURITY
dc.subject.otherSCI-TECH
dc.subject.otherITECH
dc.subject.otherINFORMATIONSCIENCE
dc.subject.otherSTM
dc.subject.othercard
dc.subject.othercontrols
dc.subject.otherdata
dc.subject.otherdepartment
dc.subject.otheridentity
dc.subject.otherindustry
dc.subject.othermanagement
dc.subject.otherpayment
dc.subject.otherprogram
dc.subject.othersystem
dc.titleInformation Security Governance Simplified
dc.title.alternativeFrom the Boardroom to the Keyboard
dc.typebook
oapen.identifier.doi10.1201/b11357
oapen.relation.isPublishedBy7b3c7b10-5b1e-40b3-860e-c6dd5197f0bb
oapen.imprintCRC Press
oapen.pages433


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record