Selling information security to the board : a primer.
Persuading the board to invest in information security measures requires sales skills. As an information security professional, you are a scientific and technical specialist; and yet you need to get your message across to people whose primary interests lie elsewhere, in turnover and overall performa...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Ely :
IT Governance Pub.,
2010.
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000Mi 4500 | ||
---|---|---|---|
001 | JSTOR_ocn700687149 | ||
003 | OCoLC | ||
005 | 20231005004200.0 | ||
006 | m o d | ||
007 | cr |n|---||||| | ||
008 | 110205s2010 enk ob 000 0 eng d | ||
040 | |a MERUC |b eng |e pn |c MERUC |d EBLCP |d OCLCQ |d IDEBK |d E7B |d N$T |d OCLCQ |d B24X7 |d UMI |d DEBSZ |d COO |d OCLCO |d JSTOR |d OCLCQ |d YDXCP |d OCLCQ |d AGLDB |d LIV |d OCLCQ |d MERUC |d OCLCQ |d IOG |d OCLCA |d OCLCF |d EZ9 |d VNS |d VTS |d CEF |d AU@ |d OCLCQ |d WYU |d LVT |d STF |d M8D |d UKAHL |d OCLCQ |d VT2 |d VLY |d MM9 |d UX1 |d OCLCO |d OCLCQ | ||
019 | |a 816576740 |a 859144395 |a 904254180 |a 1058151567 |a 1156331553 |a 1175641407 |a 1192351618 |a 1240518568 | ||
020 | |a 9781849280549 |q (electronic bk.) | ||
020 | |a 1849280541 |q (electronic bk.) | ||
020 | |z 1282737104 | ||
020 | |z 9781282737105 | ||
020 | |z 9781849280532 | ||
029 | 1 | |a AU@ |b 000048801675 | |
029 | 1 | |a AU@ |b 000051571598 | |
029 | 1 | |a DEBBG |b BV041432723 | |
029 | 1 | |a DEBBG |b BV043037513 | |
029 | 1 | |a DEBSZ |b 396399045 | |
029 | 1 | |a DEBSZ |b 398286507 | |
029 | 1 | |a DEBSZ |b 421529008 | |
035 | |a (OCoLC)700687149 |z (OCoLC)816576740 |z (OCoLC)859144395 |z (OCoLC)904254180 |z (OCoLC)1058151567 |z (OCoLC)1156331553 |z (OCoLC)1175641407 |z (OCoLC)1192351618 |z (OCoLC)1240518568 | ||
037 | |a CL0500000301 |b Safari Books Online | ||
037 | |a 22573/ctt4k572x |b JSTOR | ||
050 | 4 | |a HF5548.37 | |
072 | 7 | |a BUS |x 104000 |2 bisacsh | |
072 | 7 | |a BUS |x 071000 |2 bisacsh | |
072 | 7 | |a BUS |x 103000 |2 bisacsh | |
072 | 7 | |a BUS |x 097000 |2 bisacsh | |
072 | 7 | |a KNTX |2 bicssc | |
072 | 7 | |a COM053000 |2 bisacsh | |
082 | 0 | 4 | |a 658.478 |
049 | |a UAMI | ||
100 | 1 | |a Calder, Alan. | |
245 | 1 | 0 | |a Selling information security to the board : |b a primer. |
260 | |a Ely : |b IT Governance Pub., |c 2010. | ||
300 | |a 1 online resource (64 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
520 | |a Persuading the board to invest in information security measures requires sales skills. As an information security professional, you are a scientific and technical specialist; and yet you need to get your message across to people whose primary interests lie elsewhere, in turnover and overall performance. In other words, you need to develop sales and marketing skills. This pocket guide will help you with the essential sales skills that persuade company directors to commit money and resources to your information security initiatives. | ||
588 | 0 | |a Print version record. | |
504 | |a Includes bibliographical references. | ||
505 | 0 | |a PREFACE; ABOUT THE AUTHOR; ACKNOWLEDGEMENTS; CONTENTS; INTRODUCTION; CHAPTER 1: THE SALES PROCESS; CHAPTER 2: SALES BASICS; CHAPTER 3: SELF-PREPARATION: UNDERSTAND THE BUSINESS; CHAPTER 4: SELF-PREPARATION: SOFT SKILLS; CHAPTER 5: SELF-PREPARATION: BE CREDIBLE; CHAPTER 6: SELF-PREPARATION: BUILD A TRACK RECORD; CHAPTER 7: DEVELOP AN ALLY; CHAPTER 8: WHAT MOTIVATES MANAGERS?; CHAPTER 9: PLEASURE AND PAIN; CHAPTER 10: LEVERAGING REGULATORY COMPLIANCE; CHAPTER 11: LEVERAGING ISO 27001; CHAPTER 12: INFORMATION SECURITY GOVERNANCE; CHAPTER 13: THE PROPOSAL; CHAPTER 14: HANDLING OBJECTIONS | |
590 | |a JSTOR |b Books at JSTOR Evidence Based Acquisitions | ||
590 | |a JSTOR |b Books at JSTOR All Purchased | ||
590 | |a JSTOR |b Books at JSTOR Demand Driven Acquisitions (DDA) | ||
650 | 0 | |a Business enterprises |x Computer networks |x Security measures. | |
650 | 0 | |a Selling. | |
650 | 0 | |a Computer security |x Information technology. | |
650 | 6 | |a Vente. | |
650 | 6 | |a Sécurité informatique |x Technologie de l'information. | |
650 | 7 | |a selling. |2 aat | |
650 | 7 | |a BUSINESS & ECONOMICS |x Corporate Governance. |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Leadership. |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Organizational Development. |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Workplace Culture. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Business enterprises |x Computer networks |x Security measures. |2 fast |0 (OCoLC)fst00842535 | |
650 | 7 | |a Selling. |2 fast |0 (OCoLC)fst01111969 | |
776 | 0 | 8 | |i Print version: |a Calder, Alan. |t Selling information security to the board : a primer. |d Ely : IT Governance Publishing, ©2010 |z 9781849280532 |w (OCoLC)670190200 |
856 | 4 | 0 | |u https://jstor.uam.elogim.com/stable/10.2307/j.ctt1bj4t02 |z Texto completo |
856 | 4 | 0 | |u https://jstor.uam.elogim.com/stable/10.2307/j.ctt5hh3tg |z Texto completo |
938 | |a Askews and Holts Library Services |b ASKH |n AH26135134 | ||
938 | |a Books 24x7 |b B247 |n bks00056015 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL547040 | ||
938 | |a ebrary |b EBRY |n ebr10496562 | ||
938 | |a EBSCOhost |b EBSC |n 391156 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n 273710 | ||
938 | |a YBP Library Services |b YANK |n 3615236 | ||
994 | |a 92 |b IZTAP |