9780849319525-0849319528-The Ciso Handbook: A Practical Guide to Securing Your Company

The Ciso Handbook: A Practical Guide to Securing Your Company

FREE US shipping
Buy

From $32.43

Book details

Summary

The Ciso Handbook: A Practical Guide to Securing Your Company (ISBN-13: 9780849319525 and ISBN-10: 0849319528), written by authors Michael Gentile, Ron Collette, Thomas D. August, was published by Auerbach Publications in 2005. With an overall rating of 4.2 stars, it's a notable title among other Commerce (Economics, Information Management, Processes & Infrastructure, Production & Operations, Management & Leadership, Facility Management, Network Security, Security & Encryption, History of Technology, Technology) books. You can easily purchase or rent The Ciso Handbook: A Practical Guide to Securing Your Company (Hardcover) from BooksRun, along with many other new and used Commerce books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.62.

Description

The CISO Handbook: A Practical Guide to Securing Your Company provides unique insights and guidance into designing and implementing an information security program, delivering true value to the stakeholders of a company. The authors present several essential high-level concepts before building a robust framework that will enable you to map the concepts to your company’s environment.

The book is presented in chapters that follow a consistent methodology – Assess, Plan, Design, Execute, and Report. The first chapter, Assess, identifies the elements that drive the need for infosec programs, enabling you to conduct an analysis of your business and regulatory requirements. Plan discusses how to build the foundation of your program, allowing you to develop an executive mandate, reporting metrics, and an organizational matrix with defined roles and responsibilities. Design demonstrates how to construct the policies and procedures to meet your identified business objectives, explaining how to perform a gap analysis between the existing environment and the desired end-state, define project requirements, and assemble a rough budget. Execute emphasizes the creation of a successful execution model for the implementation of security projects against the backdrop of common business constraints. Report focuses on communicating back to the external and internal stakeholders with information that fits the various audiences.

Each chapter begins with an Overview, followed by Foundation Concepts that are critical success factors to understanding the material presented. The chapters also contain a Methodology section that explains the steps necessary to achieve the goals of the particular chapter.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book