skip to content
Information security governance simplified : from the boardroom to the keyboard Preview this item
ClosePreview this item
Checking...

Information security governance simplified : from the boardroom to the keyboard

Author: Todd Fitzgerald
Publisher: Boca Raton ; London : CRC Press, ©2012.
Edition/Format:   Print book : EnglishView all editions and formats
Summary:
"Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure. Defining the leadership skills required by  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Document Type: Book
All Authors / Contributors: Todd Fitzgerald
ISBN: 9781439811634 1439811636
OCLC Number: 751752969
Description: xxviii, 403 pages : illustrations ; 24 cm
Contents: Note continued: Applying Personality Type to Security Communications --
The Four Myers-Briggs Type Indicator (MBTI) Preference Scales --
Extraversion versus Introversion Scale --
Sensing versus Intuition Scale --
Thinking versus Feeling Scale --
Judging versus Perceiving Scale --
Determining Individual MBTI Personality --
Summing Up the MBTI for Security --
Suggested Reading --
ch. 13 The Law and Information Security --
Civil Law versus Criminal Law --
Electronic Communications Privacy Act of 1986 (ECPA) --
The Computer Security Act of 1987 --
The Privacy Act of 1974 --
Sarbanes-Oxley Act of 2002 (SOX) --
Gramm-Leach-Bliley Act (GLBA) --
Health Insurance Portability and Accountability Act of 1996 --
Health Information Technology for Economic and Clinical Health (HITECH) Act --
Federal Information Security Management Act of 2002 (FISMA) --
Summary --
Suggested Reading --
ch. 14 Learning from Information Security Incidents --
Recent Security Incidents --
Texas State Comptroller --
Sony PlayStation Network --
Student Loan Social Security Numbers Stolen --
Social Security Numbers Printed on Outside of Envelopes --
Valid E-Mail Addresses Exposed --
Office Copier Hard Disk Contained Confidential Information --
Advanced Persistent Threat Targets Security Token --
Who Will be Next? --
Every Control Could Result in an Incident --
Suggested Reading --
ch. 15 17 Ways to Dismantle Information Security Governance Efforts --
Final Thoughts --
Suggested Reading.
Responsibility: Todd Fitzgerald ; foreword by Tom Peltier.

Abstract:

"Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure. Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations."--

Reviews

Editorial reviews

Publisher Synopsis

Todd Fitzgerald's new book, Information Security Governance Simplified: From the Boardroom to the Keyboard, presents 15 chapters of advice and real-world experience on how to handle the roll out of Read more...

 
User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/751752969> # Information security governance simplified : from the boardroom to the keyboard
    a schema:Book, schema:CreativeWork ;
   library:oclcnum "751752969" ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/1009111703#Place/boca_raton> ; # Boca Raton
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/flu> ;
   library:placeOfPublication <http://dbpedia.org/resource/London> ; # London
   schema:about <http://experiment.worldcat.org/entity/work/data/1009111703#Topic/business_&_economics_commerce> ; # BUSINESS & ECONOMICS--Commerce
   schema:about <http://id.worldcat.org/fast/842723> ; # Business intelligence
   schema:about <http://id.worldcat.org/fast/972588> ; # Information networks--Security measures
   schema:about <http://id.loc.gov/authorities/subjects/sh2009127217> ; # Information technology--Security measures
   schema:about <http://id.worldcat.org/fast/973129> ; # Information technology--Security measures
   schema:about <http://id.worldcat.org/fast/972603> ; # Information resources management
   schema:about <http://experiment.worldcat.org/entity/work/data/1009111703#Topic/information_networks_security_measures> ; # Information networks--Security measures
   schema:about <http://dewey.info/class/005.8/e23/> ;
   schema:about <http://experiment.worldcat.org/entity/work/data/1009111703#Topic/computers_security_general> ; # COMPUTERS--Security--General
   schema:about <http://experiment.worldcat.org/entity/work/data/1009111703#Topic/computers_information_technology> ; # COMPUTERS--Information Technology
   schema:bookFormat bgn:PrintBook ;
   schema:copyrightYear "2012" ;
   schema:creator <http://viaf.org/viaf/9300145> ; # Todd Fitzgerald
   schema:datePublished "2012" ;
   schema:description ""Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure. Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations."--"@en ;
   schema:description "Note continued: Applying Personality Type to Security Communications -- The Four Myers-Briggs Type Indicator (MBTI) Preference Scales -- Extraversion versus Introversion Scale -- Sensing versus Intuition Scale -- Thinking versus Feeling Scale -- Judging versus Perceiving Scale -- Determining Individual MBTI Personality -- Summing Up the MBTI for Security -- Suggested Reading -- ch. 13 The Law and Information Security -- Civil Law versus Criminal Law -- Electronic Communications Privacy Act of 1986 (ECPA) -- The Computer Security Act of 1987 -- The Privacy Act of 1974 -- Sarbanes-Oxley Act of 2002 (SOX) -- Gramm-Leach-Bliley Act (GLBA) -- Health Insurance Portability and Accountability Act of 1996 -- Health Information Technology for Economic and Clinical Health (HITECH) Act -- Federal Information Security Management Act of 2002 (FISMA) -- Summary -- Suggested Reading -- ch. 14 Learning from Information Security Incidents -- Recent Security Incidents -- Texas State Comptroller -- Sony PlayStation Network -- Student Loan Social Security Numbers Stolen -- Social Security Numbers Printed on Outside of Envelopes -- Valid E-Mail Addresses Exposed -- Office Copier Hard Disk Contained Confidential Information -- Advanced Persistent Threat Targets Security Token -- Who Will be Next? -- Every Control Could Result in an Incident -- Suggested Reading -- ch. 15 17 Ways to Dismantle Information Security Governance Efforts -- Final Thoughts -- Suggested Reading."@en ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/1009111703> ;
   schema:inLanguage "en" ;
   schema:name "Information security governance simplified : from the boardroom to the keyboard"@en ;
   schema:productID "751752969" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/751752969#PublicationEvent/boca_raton_london_crc_press_2012> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/1009111703#Agent/crc_press> ; # CRC Press
   schema:workExample <http://worldcat.org/isbn/9781439811634> ;
   umbel:isLike <http://bnb.data.bl.uk/id/resource/GBB199693> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/751752969> ;
    .


Related Entities

<http://dbpedia.org/resource/London> # London
    a schema:Place ;
   schema:name "London" ;
    .

<http://experiment.worldcat.org/entity/work/data/1009111703#Topic/business_&_economics_commerce> # BUSINESS & ECONOMICS--Commerce
    a schema:Intangible ;
   schema:name "BUSINESS & ECONOMICS--Commerce"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1009111703#Topic/computers_information_technology> # COMPUTERS--Information Technology
    a schema:Intangible ;
   schema:name "COMPUTERS--Information Technology"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1009111703#Topic/computers_security_general> # COMPUTERS--Security--General
    a schema:Intangible ;
   schema:name "COMPUTERS--Security--General"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh2009127217> # Information technology--Security measures
    a schema:Intangible ;
   schema:name "Information technology--Security measures"@en ;
    .

<http://id.worldcat.org/fast/842723> # Business intelligence
    a schema:Intangible ;
   schema:name "Business intelligence"@en ;
    .

<http://id.worldcat.org/fast/972588> # Information networks--Security measures
    a schema:Intangible ;
   schema:name "Information networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/972603> # Information resources management
    a schema:Intangible ;
   schema:name "Information resources management"@en ;
    .

<http://id.worldcat.org/fast/973129> # Information technology--Security measures
    a schema:Intangible ;
   schema:name "Information technology--Security measures"@en ;
    .

<http://viaf.org/viaf/9300145> # Todd Fitzgerald
    a schema:Person ;
   schema:familyName "Fitzgerald" ;
   schema:givenName "Todd" ;
   schema:name "Todd Fitzgerald" ;
    .

<http://worldcat.org/isbn/9781439811634>
    a schema:ProductModel ;
   schema:isbn "1439811636" ;
   schema:isbn "9781439811634" ;
    .

<http://www.worldcat.org/title/-/oclc/751752969>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
   schema:about <http://www.worldcat.org/oclc/751752969> ; # Information security governance simplified : from the boardroom to the keyboard
   schema:dateModified "2018-03-10" ;
   void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.