NLU Meghalaya Library

Online Public Access Catalogue (OPAC)

Amazon cover image
Image from Amazon.com

Information security governance : a practical development and implementation approach / Krag Brotby.

By: Material type: TextSeries: Wiley series in systems engineering and managementPublication details: Hoboken, N.J. : John Wiley & Sons, �2009.Description: 1 online resource (xv, 189 pages) : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9780470476000
  • 0470476001
  • 0470131187
  • 9780470131183
Subject(s): Additional physical formats: Print version:: Information security governance.DDC classification:
  • 658.4/78 22
LOC classification:
  • HF5548.37 .B76 2009eb
Online resources:
Contents:
INFORMATION SECURITY GOVERNANCE; Contents; Acknowledgments; Introduction; 1. Governance Overview -- How Do We Do It? What Do We Get Out of It?; 2. Why Governance?; 3. Legal and Regulatory Requirements; 4. Roles and Responsibilities; 5. Strategic Metrics; 6. Information Security Outcomes; 7. Security Governance Objectives; 8. Risk Management Objectives; 9. Current State; 10. Developing a Security Strategy; 11. Sample Strategy Development; 12. Implementing Strategy; 13. Security Program Development Metrics; 14. Information Security Management Metrics; 15. Incident Management and Response Metrics.
Summary: This book provides an understanding of governance and its relevance to information security. It gives readers a clear, step-by-step approach to developing a sound security strategy aligned with their business objectives in order to ensure a predictable level of functionality and assurance. Next, it explores various approaches to implementing the strategy, guiding the reader toward practical, workable solutions. A broad range of business managers, IT security managers, and information security managers will value the guidance, action plans, and sample policies provided in this comprehensive boo.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Includes bibliographical references and index.

INFORMATION SECURITY GOVERNANCE; Contents; Acknowledgments; Introduction; 1. Governance Overview -- How Do We Do It? What Do We Get Out of It?; 2. Why Governance?; 3. Legal and Regulatory Requirements; 4. Roles and Responsibilities; 5. Strategic Metrics; 6. Information Security Outcomes; 7. Security Governance Objectives; 8. Risk Management Objectives; 9. Current State; 10. Developing a Security Strategy; 11. Sample Strategy Development; 12. Implementing Strategy; 13. Security Program Development Metrics; 14. Information Security Management Metrics; 15. Incident Management and Response Metrics.

This book provides an understanding of governance and its relevance to information security. It gives readers a clear, step-by-step approach to developing a sound security strategy aligned with their business objectives in order to ensure a predictable level of functionality and assurance. Next, it explores various approaches to implementing the strategy, guiding the reader toward practical, workable solutions. A broad range of business managers, IT security managers, and information security managers will value the guidance, action plans, and sample policies provided in this comprehensive boo.

Print version record.

John Wiley and Sons Wiley Online Library: Complete oBooks

There are no comments on this title.

to post a comment.