Cargando…

Once more unto the breach : managing information security in an uncertain world /

The challenges you face as an information security manager (ISM) have increased enormously since the first edition of this title was published. What seemed exceptional in 2011 is the norm in 2015: vulnerabilities have been experienced across all operating systems, millions of individuals have been a...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Simmons, Andrea C. (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Cambridgeshire, England : IT Governance Publishing, 2015.
Edición:Second edition.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Cover; Once more unto the Breach; Title Page; Copy Page; Preface; About The Author; Acknowledgements; Contents; Introduction; Chapter 1: August: Pulling a team together; It's not a project; Make friends and influence people; There's always a need for a 'list' (well, if it's good enough for Santa Claus!); Project management; Chapter summary; Chapter 2: September: Street trash; Introduction; Incompatible software; Remote workers; User acceptance testing; Physical security; Password management; Laptop management; Chapter summary; Chapter 3: October: Compliance may be only skin deep; Introduction.
  • Information security policyManaging corporate antivirus; Standard build and image; Password management (again); Consumerisation; Third-party management; Audit log management; Vulnerability management; Cloud computing; Project management; Chapter summary; Chapter 4: November: How remote is remote?; Introduction; Location, location, location; Innovation, innovation, innovation; Information labelling; Lessons learnt; Chapter summary; Chapter 5: December: Oh, for the sake of yet another proposal; Security improvement programme; Fax management; Image build again; Physical security findings.
  • Physical security solution suggestionsOther security tasks for this month; Chapter summary; Chapter 6: January: A battle won; Baking security in; Desktop refresh versus consumerisation; Incident reporting; Data-sharing protocols; Linking InfoSec with records management; Penetration testing results; Back to physical security issues; Reduce, reuse, recycle; Other security tasks for this month; Chapter summary; Chapter 7: February: Money doesn't buy happiness; Divide and conquer?; Remember the big picture; Breadth of technological change; Embracing data protection and privacy.
  • Other security tasks for this monthChapter summary; Chapter 8: March: Slipping through the net; The impact of politics; Privacy impact assessments; Managing a virus outbreak; Other information security tasks this month; Chapter summary; Chapter 9: April: Linking InfoSec with InfoGov; A linguistic journey to information governance; How did we get here?; Other security tasks for this month; Chapter summary; Chapter 10: May: Politics and management; Situational political awareness; Language and management challenges; Other security tasks for this month; Chapter summary.
  • Chapter 11: June: What the auditors shouldn't knowInternal audit has history; Increasing and varied security incidents; Security awareness theme; Chapter summary; Chapter 12: July: Journey's end ... and conclusion; Returning to the lessons learnt; The life of an information security manager; Things I haven't spent a lot of time on; Closing thoughts; And finally, be an active professional; Appendix 1: Security Awareness Themes; Appendix 2: ISM Activities; Appendix 3: Resources; ITG Resources.