logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Information Security Playbook 1st Edition Greg Kane And Lorna Koppel Eds

  • SKU: BELL-4556782
Information Security Playbook 1st Edition Greg Kane And Lorna Koppel Eds
$ 31.00 $ 45.00 (-31%)

0.0

0 reviews

Information Security Playbook 1st Edition Greg Kane And Lorna Koppel Eds instant download after payment.

Publisher: Elsevier
File Extension: PDF
File size: 3.62 MB
Pages: 115
Author: Greg Kane and Lorna Koppel (Eds.)
ISBN: 9780124172326, 0124172326
Language: English
Year: 2013
Edition: 1

Product desciption

Information Security Playbook 1st Edition Greg Kane And Lorna Koppel Eds by Greg Kane And Lorna Koppel (eds.) 9780124172326, 0124172326 instant download after payment.

The primarygoal of the Information Protection Playbook is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that protects the applications, systems, and networks that deliver business information from failures of confidentiality, integrity, availability, trust and accountability, and privacy.

Using the guidelines provided in the Information Protection Playbook, security and information technology (IT) managers will learn how to implement the five functions of an IP framework: governance, program planning, risk management, incident response management, and program administration. These functions are based on a model promoted by the Information Systems Audit and Control Association (ISACA) and validated by thousands of Certified Information Security Managers. The five functions are further broken down into a series of objectives or milestones to be achieved in order to implement an IP framework.

The extensive appendices included at the end of the book make for an excellent resource for the security or IT manager building an IP program from the ground up. They include, for example, a board of directors presentation complete with sample slides; an IP policy document checklist; a risk prioritization procedure matrix, which illustrates how to classify a threat based on a scale of high, medium, and low; a facility management self-assessment questionnaire; and a list of representative job descriptions for roles in IP.

The Information Protection Playbook is a part of Elsevier's Security Executive Council Risk Management Portfolio, a collection of real world solutions and ''how-to'' guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.

  • Emphasizes information protection guidelines that are driven by business objectives, laws, regulations, and industry standards
  • Draws from successful practices in global organizations, benchmarking, advice from a variety of subject-matter experts, and feedback from the organizations involved with the Security Executive Council
  • Includes 11 appendices full of the sample checklists, matrices, and forms that are discussed in the book

Related Products