A practical guide to establishing a risk-based, business-focused information security program to ensure organizational success
Information Security Handbook is a practical guide that’ll empower you to take effective actions in securing your organization’s assets. Whether you are an experienced security professional seeking to refine your skills or someone new to the field looking to build a strong foundation, this book is designed to meet you where you are and guide you toward improving your understanding of information security.
Each chapter addresses the key concepts, practical techniques, and best practices to establish a robust and effective information security program. You’ll be offered a holistic perspective on securing information, including risk management, incident response, cloud security, and supply chain considerations. This book has distilled years of experience and expertise of the author, Darren Death, into clear insights that can be applied directly to your organization’s security efforts. Whether you work in a large enterprise, a government agency, or a small business, the principles and strategies presented in this book are adaptable and scalable to suit your specific needs.
By the end of this book, you’ll have all the tools and guidance needed to fortify your organization’s defenses and expand your capabilities as an information security practitioner.
This book is for information security professionals looking to understand critical success factors needed to build a successful, business-aligned information security program. Additionally, this book is well suited for anyone looking to understand key aspects of an information security program and how it should be implemented within an organization. If you’re looking for an end-to-end guide to information security and risk analysis with no prior knowledge of this domain, then this book is for you.
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
Darren Death is ASRC Federal’s Chief Information Security Officer. He is responsible for managing the enterprise cybersecurity program across a 3 billion-dollar portfolio of business sectors, including financial services, government contracting, and construction. A proven technology leader with over 20 years of experience deploying enterprise systems for large private and public organizations, Darren Death has led, designed, and implemented large-scale, organizational-wide enterprise IT systems with far-reaching impact. Before joining ASRC Federal, while at the Department of Justice, he was responsible for creating a nationwide enterprise processing capability across the US Attorney, Marshalls Service, and the Bureau of Alcohol, Tobacco, and Firearms divisions. At the Library of Congress, Darren was responsible for all emerging technologies related to information security.
He holds a doctoral degree in information technology, specializing in information assurance and cybersecurity.
Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.
EUR 6,98 expédition depuis Etats-Unis vers France
Destinations, frais et délaisVendeur : California Books, Miami, FL, Etats-Unis
Etat : New. N° de réf. du vendeur I-9781837632701
Quantité disponible : Plus de 20 disponibles
Vendeur : Ria Christie Collections, Uxbridge, Royaume-Uni
Etat : New. In. N° de réf. du vendeur ria9781837632701_new
Quantité disponible : Plus de 20 disponibles
Vendeur : PBShop.store US, Wood Dale, IL, Etats-Unis
PAP. Etat : New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. N° de réf. du vendeur L0-9781837632701
Quantité disponible : Plus de 20 disponibles
Vendeur : PBShop.store UK, Fairford, GLOS, Royaume-Uni
PAP. Etat : New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. N° de réf. du vendeur L0-9781837632701
Quantité disponible : Plus de 20 disponibles
Vendeur : BargainBookStores, Grand Rapids, MI, Etats-Unis
Paperback or Softback. Etat : New. Information Security Handbook - Second Edition: Enhance your proficiency in information security program development 1.4. Book. N° de réf. du vendeur BBS-9781837632701
Quantité disponible : 5 disponible(s)
Vendeur : THE SAINT BOOKSTORE, Southport, Royaume-Uni
Paperback / softback. Etat : New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 526. N° de réf. du vendeur C9781837632701
Quantité disponible : Plus de 20 disponibles
Vendeur : Books Puddle, New York, NY, Etats-Unis
Etat : New. 2nd ed. edition NO-PA16APR2015-KAP. N° de réf. du vendeur 26400914737
Quantité disponible : 4 disponible(s)
Vendeur : Biblios, Frankfurt am main, HESSE, Allemagne
Etat : New. PRINT ON DEMAND. N° de réf. du vendeur 18400914747
Quantité disponible : 4 disponible(s)
Vendeur : Majestic Books, Hounslow, Royaume-Uni
Etat : New. Print on Demand. N° de réf. du vendeur 395495150
Quantité disponible : 4 disponible(s)
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
Taschenbuch. Etat : Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - A practical guide to establishing a risk-based, business-focused information security program to ensure organizational successKey FeaturesFocus on business alignment, engagement, and support using risk-based methodologiesEstablish organizational communication and collaboration emphasizing a culture of securityImplement information security program, cybersecurity hygiene, and architectural and engineering best practicesPurchase of the print or Kindle book includes a free PDF Elektronisches BuchBook DescriptionInformation Security Handbook is a practical guide that'll empower you to take effective actions in securing your organization's assets. Whether you are an experienced security professional seeking to refine your skills or someone new to the field looking to build a strong foundation, this book is designed to meet you where you are and guide you toward improving your understanding of information security.Each chapter addresses the key concepts, practical techniques, and best practices to establish a robust and effective information security program. You'll be offered a holistic perspective on securing information, including risk management, incident response, cloud security, and supply chain considerations. This book has distilled years of experience and expertise of the author, Darren Death, into clear insights that can be applied directly to your organization's security efforts. Whether you work in a large enterprise, a government agency, or a small business, the principles and strategies presented in this book are adaptable and scalable to suit your specific needs.By the end of this book, you'll have all the tools and guidance needed to fortify your organization's defenses and expand your capabilities as an information security practitioner.What you will learnIntroduce information security program best practices to your organizationLeverage guidance on compliance with industry standards and regulationsImplement strategies to identify and mitigate potential security threatsIntegrate information security architecture and engineering principles across the systems development and engineering life cycleUnderstand cloud computing, Zero Trust, and supply chain risk managementWho this book is forThis book is for information security professionals looking to understand critical success factors needed to build a successful, business-aligned information security program. Additionally, this book is well suited for anyone looking to understand key aspects of an information security program and how it should be implemented within an organization. If you're looking for an end-to-end guide to information security and risk analysis with no prior knowledge of this domain, then this book is for you.Table of ContentsInformation and Data Security FundamentalsDefining the Threat LandscapeLaying a Foundation for Information and Data SecurityInformation Security Risk ManagementDeveloping Your Information and Data Security PlanContinuous Testing and MonitoringBusiness Continuity/Disaster Recovery PlanningIncident Response PlanningDeveloping a Security Operations CenterDeveloping an Information Security Architecture ProgramCloud Security ConsiderationsZero Trust Architecture in Information SecurityThird-Party and Supply Chain Security. N° de réf. du vendeur 9781837632701
Quantité disponible : 1 disponible(s)