Buch, Englisch, 216 Seiten, Format (B × H): 178 mm x 254 mm
Fight the Good Fight
Buch, Englisch, 216 Seiten, Format (B × H): 178 mm x 254 mm
Reihe: Security, Audit and Leadership Series
ISBN: 978-1-032-89600-7
Verlag: Taylor & Francis Ltd
Business executives consider what is necessary to protect the company. It comes down to people, process and technology, organized within an information security program. Everything has its place within the program, including business processes, assets and the right blend of controls to protect them.
This book describes program architecture, the discipline of designing, implementing and leading information security programs.
• Prove Yourself Ready Now
• Team Development and Retention
• Program Maturity
• Influence Support and Funding
• Cyber Threat Intelligence
• Third Party Risk Management
• Metrics and Reporting
• Insider Risk Monitoring and Response
• Threat Landscape and Controls Analysis
• Conduct an Assessment
• Crisis Communications
• Control by Governance
This book provides practical advice in the areas of cybersecurity and operational risk management. The goal is to provide readers with practical advice they can use upon return to work.
Zielgruppe
Professional Practice & Development, Professional Reference, and Professional Training
Autoren/Hrsg.
Fachgebiete
- Wirtschaftswissenschaften Betriebswirtschaft Management Risikomanagement
- Wirtschaftswissenschaften Finanzsektor & Finanzdienstleistungen Finanzsektor & Finanzdienstleistungen: Allgemeines
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit
- Technische Wissenschaften Bauingenieurwesen Gebäudesicherheit
- Geisteswissenschaften Architektur Gestaltung, Darstellung, Bautechnik
Weitere Infos & Material
Author Biography Table of Figures Introduction Chapter 1: Prove Yourself Ready Now Chapter 2: Team Development and Retention Chapter 3: Program Maturity Chapter 4: Influence Support and Funding Chapter 5: Cyber Threat Intelligence Chapter 6: Third Party Risk Management Chapter 7: Metrics and Reporting Chapter 8: Insider Risk Monitoring and Response Chapter 9: Threat Landscape and Controls Analysis Chapter 10: Conduct an Assessment Chapter 11: Crisis Communications Chapter 12: Control by Governance Appendix Index References