Cargando…

Nine steps to success : an ISO 27001:2013 implementation overview /

Step-by-step guidance on a successful ISO 27001 implementation from an industry leader Resilience to cyber attacks requires an organization to defend itself across all of its attack surface: people, processes, and technology. ISO 27001 is the international standard that sets out the requirements of...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Calder, Alan, 1957- (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Ely, Cambridgeshire, United Kingdom : IT Governance Publishing, 2017.
Edición:North American edition.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 JSTOR_on1011348648
003 OCoLC
005 20231005004200.0
006 m o d
007 cr cnu---unuuu
008 171113t20172017enk ob 000 0 eng d
040 |a JSTOR  |b eng  |e rda  |e pn  |c JSTOR  |d OCLCF  |d OCLCA  |d UMI  |d STF  |d TOH  |d UAB  |d OCLCQ  |d CEF  |d OCLCQ  |d DEBBG  |d G3B  |d YDXIT  |d VLB  |d VT2  |d OCLCO  |d OCLCQ  |d CZL  |d OCLCO  |d LUU  |d OCLCQ  |d OCLCO 
019 |a 1033544463 
020 |a 9781849289504  |q (electronic book) 
020 |a 1849289506  |q (electronic book) 
020 |a 9781849289511  |q (electronic book) 
020 |a 1849289514  |q (electronic book) 
020 |z 1849289492 
020 |z 9781849289498 
029 1 |a AU@  |b 000062543187 
035 |a (OCoLC)1011348648  |z (OCoLC)1033544463 
037 |a 22573/ctt1wpdwf2  |b JSTOR 
050 4 |a HF5548.37  |b .C35 2017 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Calder, Alan,  |d 1957-  |e author. 
245 1 0 |a Nine steps to success :  |b an ISO 27001:2013 implementation overview /  |c Alan Calder. 
246 3 |a 9 steps to success 
250 |a North American edition. 
264 1 |a Ely, Cambridgeshire, United Kingdom :  |b IT Governance Publishing,  |c 2017. 
264 4 |c ©2017 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references. 
588 0 |a Online resource; title from digital title page (viewed on June 20, 2019). 
520 |a Step-by-step guidance on a successful ISO 27001 implementation from an industry leader Resilience to cyber attacks requires an organization to defend itself across all of its attack surface: people, processes, and technology. ISO 27001 is the international standard that sets out the requirements of an information security management system (ISMS) - a holistic approach to information security that encompasses people, processes, and technology. Accredited certification to the Standard is recognized worldwide as the hallmark of best-practice information security management. Achieving and maintaining accredited certification to ISO 27001 can be complicated, especially for those who are new to the Standard. Author of Nine Steps to Success - An ISO 27001 Implementation Overview, Alan Calder is the founder and executive chairman of IT Governance. He led the world's first implementation of a management system certified to BS 7799, the forerunner to ISO 27001, and has been working with the Standard ever since. Hundreds of organizations around the world have achieved accredited certification to ISO 27001 with IT Governance's guidance, which is distilled in this book. Successfully implement ISO 27001 with this must-have guide Aligned with the latest iteration of ISO 27001:2013, the North American edition of Nine Steps to Success - An ISO 27001 Implementation Overview is ideal for anyone tackling ISO 27001 for the first time. In nine critical steps, the guide covers each element of the ISO 27001 project in simple, non-technical language. There is a special focus on how US organizations can tackle this governance. This book offers guidance throughout implementation: Getting management support and keeping the board's attention. Creating a management framework and performing a gap analysis so that you can clearly understand the controls you already have in place, and identify where you need to focus. Structuring and resourcing your project, including advice on whether to use a consultant or do it yourself, and examining the tools and resources that will make your job easier. Conducting a five-step risk assessment, and creating a Statement of Applicability (SoA) and risk treatment plan (RTP). Guidance on integrating your ISO 27001 ISMS with an ISO 9001 quality management system (QMS) and other management systems. Addressing the documentation challenges you'll face as you create business policies, procedures, work instructions, and records - includin... 
590 |a JSTOR  |b Books at JSTOR All Purchased 
590 |a JSTOR  |b Books at JSTOR Demand Driven Acquisitions (DDA) 
590 |a JSTOR  |b Books at JSTOR Evidence Based Acquisitions 
650 0 |a Computer security  |x Management. 
650 0 |a Computer security  |x Standards. 
650 0 |a Data protection  |x Standards. 
650 6 |a Sécurité informatique  |x Gestion. 
650 6 |a Sécurité informatique  |x Normes. 
650 6 |a Protection de l'information (Informatique)  |v Normes. 
650 6 |a Protection de l'information (Informatique)  |x Normes. 
650 7 |a Computer security  |x Management  |2 fast 
650 7 |a Computer security  |x Standards  |2 fast 
650 7 |a Data protection  |x Standards  |2 fast 
710 2 |a IT Governance Publishing,  |e publisher. 
776 0 8 |i Print version:  |a IT GOVERNANCE PUBLISHING.  |t NINE STEPS TO SUCCESS.  |d [Place of publication not identified] : IT GOVERNANCE LTD, 2017  |z 1849289492  |w (OCoLC)1007058371 
856 4 0 |u https://jstor.uam.elogim.com/stable/10.2307/j.ctt1wn0skw  |z Texto completo 
994 |a 92  |b IZTAP