Articles liés à Information Security Leaders Handbook: How To Be An...

Information Security Leaders Handbook: How To Be An Effective Information Security Leader By Focusing On Fundamental Models - Couverture souple

 
9781492160366: Information Security Leaders Handbook: How To Be An Effective Information Security Leader By Focusing On Fundamental Models

Synopsis

The information security threat landscape changes frequently as a result of changes in technologies, economic issues, globalization, social activism and hectavism, new political realities, and innovations by plain old criminals who want to steal data for financial benefits. Along with, the role and responsibilities of security professionals, especially the ones in the leadership roles, also change. Instead of playing a catch up game all the time, this book emphasizes focusing on basic principles and techniques. The information security leaders should implement these principles to update their personal knowledge, to safeguard their organization’s information assets and optimize information security cost. After having meetings with many information security leaders in diverse industry sectors, I have realized that there is a set of “fundamental” models that help these leaders run successful and effective information security programs. This book is a summary of these fundamentals. Who are the target audience? If you are an information security professional, whether in a leadership role or aspiring to be a future leader, this book is for you. What is this book about? The objective of this book is to make you successful as information security professional by learning from experience of great leaders in this field. It provides core fundamental models in a concise manner that are easy to read and use in managing information security. Most of the chapters accompany visual mind maps, action items, and other visual tools for easy understanding. How is this book organized? The book covers a set of carefully selected topics. This is to ensure that focus remains on principles that are the most important to the success of a security professional. The topics are arranged in six parts as listed below. 1. Know The Business – List of topics important for understanding and knowing the business. 2. Information Security Strategy – Elements of information security strategy, how to create strategy and put it into practice. 3. Security Operations – Major areas related to running an effective security operations program. 4. Risk Management – How to assess and manage risk. 5. Personal Branding – Creating personal brand and establishing credibility to be effective as information security leader. 6. Appendices – Miscellaneous data points and sources of information. How I Use This Book? I suggest that you read one chapter daily, take actions, set goals, and write those actions and goals on the “Goals and Activity Log” page at the end of each chapter. Next day, read another chapter and write the actions and goals with target dates. As you go along, start reading random chapters and keep on reviewing and updating your actions and goals to measure your progress and success. A Systematic Way of Achieving Excellence The book provides a systematic and measureable way towards excellence in your job. I have gone to great length to limit each topic to two pages or less. Please use the “Goals and Activity Log” page to record your progress and make the best use of your time. While you go along, record your experiences and share them on the book web site. Book Web Site Many detailed mind maps, new articles, and discussions are made available at the book web site http://InfoSecLeadersHandbook.wordpress.com. New content will be added on an ongoing basis and you can actually publish your own mind maps on this web site. I would like this web site to be driven by the community where you can share your experiences, tools, mind maps, and any other information to help the information security leaders. Please register on the web site to receive updates.

Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.

Présentation de l'éditeur

The information security threat landscape changes frequently as a result of changes in technologies, economic issues, globalization, social activism and hectavism, new political realities, and innovations by plain old criminals who want to steal data for financial benefits. Along with, the role and responsibilities of security professionals, especially the ones in the leadership roles, also change. Instead of playing a catch up game all the time, this book emphasizes focusing on basic principles and techniques. The information security leaders should implement these principles to update their personal knowledge, to safeguard their organization’s information assets and optimize information security cost. After having meetings with many information security leaders in diverse industry sectors, I have realized that there is a set of “fundamental” models that help these leaders run successful and effective information security programs. This book is a summary of these fundamentals. Who are the target audience? If you are an information security professional, whether in a leadership role or aspiring to be a future leader, this book is for you. What is this book about? The objective of this book is to make you successful as information security professional by learning from experience of great leaders in this field. It provides core fundamental models in a concise manner that are easy to read and use in managing information security. Most of the chapters accompany visual mind maps, action items, and other visual tools for easy understanding. How is this book organized? The book covers a set of carefully selected topics. This is to ensure that focus remains on principles that are the most important to the success of a security professional. The topics are arranged in six parts as listed below. 1. Know The Business – List of topics important for understanding and knowing the business. 2. Information Security Strategy – Elements of information security strategy, how to create strategy and put it into practice. 3. Security Operations – Major areas related to running an effective security operations program. 4. Risk Management – How to assess and manage risk. 5. Personal Branding – Creating personal brand and establishing credibility to be effective as information security leader. 6. Appendices – Miscellaneous data points and sources of information. How I Use This Book? I suggest that you read one chapter daily, take actions, set goals, and write those actions and goals on the “Goals and Activity Log” page at the end of each chapter. Next day, read another chapter and write the actions and goals with target dates. As you go along, start reading random chapters and keep on reviewing and updating your actions and goals to measure your progress and success. A Systematic Way of Achieving Excellence The book provides a systematic and measureable way towards excellence in your job. I have gone to great length to limit each topic to two pages or less. Please use the “Goals and Activity Log” page to record your progress and make the best use of your time. While you go along, record your experiences and share them on the book web site. Book Web Site Many detailed mind maps, new articles, and discussions are made available at the book web site http://InfoSecLeadersHandbook.wordpress.com. New content will be added on an ongoing basis and you can actually publish your own mind maps on this web site. I would like this web site to be driven by the community where you can share your experiences, tools, mind maps, and any other information to help the information security leaders. Please register on the web site to receive updates.

Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.

Acheter D'occasion

état :  Satisfaisant
Most items will be dispatched the...
Afficher cet article

EUR 6,21 expédition depuis Royaume-Uni vers Etats-Unis

Destinations, frais et délais

Acheter neuf

Afficher cet article
EUR 14,97

Autre devise

EUR 3,43 expédition vers Etats-Unis

Destinations, frais et délais

Résultats de recherche pour Information Security Leaders Handbook: How To Be An...

Image fournie par le vendeur

Rehman, Rafeeq U
ISBN 10 : 1492160369 ISBN 13 : 9781492160366
Ancien ou d'occasion Couverture souple

Vendeur : WeBuyBooks, Rossendale, LANCS, Royaume-Uni

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Etat : Good. Most items will be dispatched the same or the next working day. A copy that has been read but remains in clean condition. All of the pages are intact and the cover is intact and the spine may show signs of wear. The book may have minor markings which are not specifically mentioned. A few small marks or stains to the page edges/pages. N° de réf. du vendeur rev8218496780

Contacter le vendeur

Acheter D'occasion

EUR 9,14
Autre devise
Frais de port : EUR 6,21
De Royaume-Uni vers Etats-Unis
Destinations, frais et délais

Quantité disponible : 1 disponible(s)

Ajouter au panier

Image d'archives

Rehman, Rafeeq U
ISBN 10 : 1492160369 ISBN 13 : 9781492160366
Neuf Couverture souple

Vendeur : Lucky's Textbooks, Dallas, TX, Etats-Unis

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Etat : New. N° de réf. du vendeur ABLIING23Mar2716030177935

Contacter le vendeur

Acheter neuf

EUR 14,97
Autre devise
Frais de port : EUR 3,43
Vers Etats-Unis
Destinations, frais et délais

Quantité disponible : Plus de 20 disponibles

Ajouter au panier

Image d'archives

Rehman, Rafeeq U
ISBN 10 : 1492160369 ISBN 13 : 9781492160366
Neuf Couverture souple
impression à la demande

Vendeur : California Books, Miami, FL, Etats-Unis

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Etat : New. Print on Demand. N° de réf. du vendeur I-9781492160366

Contacter le vendeur

Acheter neuf

EUR 18,62
Autre devise
Frais de port : Gratuit
Vers Etats-Unis
Destinations, frais et délais

Quantité disponible : Plus de 20 disponibles

Ajouter au panier

Image d'archives

Rafeeq U Rehman
ISBN 10 : 1492160369 ISBN 13 : 9781492160366
Neuf Paperback / softback
impression à la demande

Vendeur : THE SAINT BOOKSTORE, Southport, Royaume-Uni

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Paperback / softback. Etat : New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 243. N° de réf. du vendeur C9781492160366

Contacter le vendeur

Acheter neuf

EUR 41,22
Autre devise
Frais de port : EUR 15,12
De Royaume-Uni vers Etats-Unis
Destinations, frais et délais

Quantité disponible : Plus de 20 disponibles

Ajouter au panier

Image d'archives

Rafeeq U. Rehman
ISBN 10 : 1492160369 ISBN 13 : 9781492160366
Neuf Paperback

Vendeur : CitiRetail, Stevenage, Royaume-Uni

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Paperback. Etat : new. Paperback. The information security threat landscape changes frequently as a result of changes in technologies, economic issues, globalization, social activism and hectavism, new political realities, and innovations by plain old criminals who want to steal data for financial benefits. Along with, the role and responsibilities of security professionals, especially the ones in the leadership roles, also change. Instead of playing a catch up game all the time, this book emphasizes focusing on basic principles and techniques. The information security leaders should implement these principles to update their personal knowledge, to safeguard their organization's information assets and optimize information security cost. After having meetings with many information security leaders in diverse industry sectors, I have realized that there is a set of "fundamental" models that help these leaders run successful and effective information security programs. This book is a summary of these fundamentals. Who are the target audience? If you are an information security professional, whether in a leadership role or aspiring to be a future leader, this book is for you. What is this book about? The objective of this book is to make you successful as information security professional by learning from experience of great leaders in this field. It provides core fundamental models in a concise manner that are easy to read and use in managing information security. Most of the chapters accompany visual mind maps, action items, and other visual tools for easy understanding. How is this book organized? The book covers a set of carefully selected topics. This is to ensure that focus remains on principles that are the most important to the success of a security professional. The topics are arranged in six parts as listed below. 1. Know The Business - List of topics important for understanding and knowing the business. 2. Information Security Strategy - Elements of information security strategy, how to create strategy and put it into practice. 3. Security Operations - Major areas related to running an effective security operations program. 4. Risk Management - How to assess and manage risk. 5. Personal Branding - Creating personal brand and establishing credibility to be effective as information security leader. 6. Appendices - Miscellaneous data points and sources of information. How I Use This Book? I suggest that you read one chapter daily, take actions, set goals, and write those actions and goals on the "Goals and Activity Log" page at the end of each chapter. Next day, read another chapter and write the actions and goals with target dates. As you go along, start reading random chapters and keep on reviewing and updating your actions and goals to measure your progress and success. A Systematic Way of Achieving Excellence The book provides a systematic and measureable way towards excellence in your job. I have gone to great length to limit each topic to two pages or less. Please use the "Goals and Activity Log" page to record your progress and make the best use of your time. While you go along, record your experiences and share them on the book web site. Book Web Site Many detailed mind maps, new articles, and discussions are made available at the book web site New content will be added on an ongoing basis and you can actually publish your own mind maps on this web site. I would like this web site to be driven by the community where you can share your experiences, tools, mind maps, and any other information to help the information security leaders. Please register on the web site to receive updates. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability. N° de réf. du vendeur 9781492160366

Contacter le vendeur

Acheter neuf

EUR 24,80
Autre devise
Frais de port : EUR 42,44
De Royaume-Uni vers Etats-Unis
Destinations, frais et délais

Quantité disponible : 1 disponible(s)

Ajouter au panier