Buch, Englisch, 128 Seiten, Format (B × H): 156 mm x 229 mm, Gewicht: 191 g
Buch, Englisch, 128 Seiten, Format (B × H): 156 mm x 229 mm, Gewicht: 191 g
ISBN: 978-0-12-417232-6
Verlag: Elsevier Science
Using the guidelines provided in the Information Protection Playbook, security and information technology (IT) managers will learn how to implement the five functions of an IP framework: governance, program planning, risk management, incident response management, and program administration. These functions are based on a model promoted by the Information Systems Audit and Control Association (ISACA) and validated by thousands of Certified Information Security Managers. The five functions are further broken down into a series of objectives or milestones to be achieved in order to implement an IP framework.
The extensive appendices included at the end of the book make for an excellent resource for the security or IT manager building an IP program from the ground up. They include, for example, a board of directors presentation complete with sample slides; an IP policy document checklist; a risk prioritization procedure matrix, which illustrates how to classify a threat based on a scale of high, medium, and low; a facility management self-assessment questionnaire; and a list of representative job descriptions for roles in IP.
The Information Protection Playbook is a part of Elsevier's Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
Information Protection Function 1: Governance
Information Protection Function 2: Program Planning
Information Protection Function 3: Risk Management
Information Protection Function 4: Incident Response Management
Information Protection Function 5: Program Administration
Appendix A: Playbook Summary
Appendix B: Board of Directors Presentation
Appendix C: Information Protection Policies Checklist
Appendix D: An Example Roles and Responsibilities RACI Matrix
Appendix E: Risk Prioritization Procedure Matrix
Appendix F: Security Awareness and Training Menu
Appendix G: Risk Assessment and Compliance Checklist
Appendix H: Incident Response
Appendix I: Facility Management Self-Assessment
Appendix J: Roles in Information Protection
Appendix K: Measurement in Information Protection
Additional Resources