CISO Handbook: A Practical Guide to Securing Your Company, The

The CISO Handbook: A Practical Guide to Securing Your Company provides unique insights and guidance into designing and implementing an information security program, delivering true value to the stakeholders of a company. The authors present several essential high-level concepts before building a rob...

Mô tả đầy đủ

Đã lưu trong:
Chi tiết về thư mục
Những tác giả chính: Gentile, Michael, Collette, Ronald, August, Thomas
Định dạng: Sách
Ngôn ngữ:English
Được phát hành: CRC Press 2009
Truy cập trực tuyến:http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1447
Các nhãn: Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
Thư viện lưu trữ: Thư viện Trường Đại học Đà Lạt
id oai:scholar.dlu.edu.vn:DLU123456789-1447
record_format dspace
institution Thư viện Trường Đại học Đà Lạt
collection Thư viện số
language English
description The CISO Handbook: A Practical Guide to Securing Your Company provides unique insights and guidance into designing and implementing an information security program, delivering true value to the stakeholders of a company. The authors present several essential high-level concepts before building a robust framework that will enable you to map the concepts to your company's environment. The book is presented in chapters that follow a consistent methodology - Assess, Plan, Design, Execute, and Report. The first chapter, Assess, identifies the elements that drive the need for infosec programs, enabling you to conduct an analysis of your business and regulatory requirements. Plan discusses how to build the foundation of your program, allowing you to develop an executive mandate, reporting metrics, and an organizational matrix with defined roles and responsibilities. Design demonstrates how to construct the policies and procedures to meet your identified business objectives, explaining how to perform a gap analysis between the existing environment and the desired end-state, define project requirements, and assemble a rough budget. Execute emphasizes the creation of a successful execution model for the implementation of security projects against the backdop of common business constraints. Report focuses on communicating back to the external and internal stakeholders with information that fits the various audiences. Each chapter begins with an Overview, followed by Foundation Concepts that are critical success factors to understanding the material presented. The chapters also contain a Methodology section that explains the steps necessary to achieve the goals of the particular chapter.
format Book
author Gentile, Michael
Collette, Ronald
August, Thomas
spellingShingle Gentile, Michael
Collette, Ronald
August, Thomas
CISO Handbook: A Practical Guide to Securing Your Company, The
author_facet Gentile, Michael
Collette, Ronald
August, Thomas
author_sort Gentile, Michael
title CISO Handbook: A Practical Guide to Securing Your Company, The
title_short CISO Handbook: A Practical Guide to Securing Your Company, The
title_full CISO Handbook: A Practical Guide to Securing Your Company, The
title_fullStr CISO Handbook: A Practical Guide to Securing Your Company, The
title_full_unstemmed CISO Handbook: A Practical Guide to Securing Your Company, The
title_sort ciso handbook: a practical guide to securing your company, the
publisher CRC Press
publishDate 2009
url http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1447
_version_ 1757677686139912192
spelling oai:scholar.dlu.edu.vn:DLU123456789-14472009-12-02T08:12:57Z CISO Handbook: A Practical Guide to Securing Your Company, The Gentile, Michael Collette, Ronald August, Thomas The CISO Handbook: A Practical Guide to Securing Your Company provides unique insights and guidance into designing and implementing an information security program, delivering true value to the stakeholders of a company. The authors present several essential high-level concepts before building a robust framework that will enable you to map the concepts to your company's environment. The book is presented in chapters that follow a consistent methodology - Assess, Plan, Design, Execute, and Report. The first chapter, Assess, identifies the elements that drive the need for infosec programs, enabling you to conduct an analysis of your business and regulatory requirements. Plan discusses how to build the foundation of your program, allowing you to develop an executive mandate, reporting metrics, and an organizational matrix with defined roles and responsibilities. Design demonstrates how to construct the policies and procedures to meet your identified business objectives, explaining how to perform a gap analysis between the existing environment and the desired end-state, define project requirements, and assemble a rough budget. Execute emphasizes the creation of a successful execution model for the implementation of security projects against the backdop of common business constraints. Report focuses on communicating back to the external and internal stakeholders with information that fits the various audiences. Each chapter begins with an Overview, followed by Foundation Concepts that are critical success factors to understanding the material presented. The chapters also contain a Methodology section that explains the steps necessary to achieve the goals of the particular chapter. Assess Overview Foundation Concepts Critical Skills Consultative Sales Skills Critical Knowledge Understanding Your Business Understanding Risk Understanding Your Enterprise Differentiators Understanding Your Legal and Regulatory Environment Understanding Your Organizational Structure Understanding Your Organizational Dynamics Enterprise Culture Understanding your Enterprise's View of Technology Assessment Methodology Identifying your Program's Primary Driver Why Are You Here? Stakeholders Identifying your External Drivers Other External Drivers Identifying your Internal Drivers Assessment Checklist Plan Overview Foundation Concepts Critical Skills Visioning Strategic Planning Negotiating Marketing Talent Assessment Critical Skills Summary Critical Knowledge ISC2 Common Body of Knowledge [CBK] Other Security Industry Resources Planning Methodology Understanding your Program's Mandate Determining Your Program's Structure Centralized vs. Decentralized Security Pipeline Size of Your Program Security Program Structure Summary Determining Your Program's Staffing Planning Summary Planning Checklist Design Overview Foundation Concepts Critical Skills Critical Knowledge Methodology Preview Security Document Development Project Portfolio Development Communication Plan Development Incorporating your Enterprise Drivers Requirements Gap Analysis Building Security Policies, Standards, Procedures, And Guidelines Build Security Documents Summary Building the Security Project Portfolio Annual Portfolio Review Build the Communication Plan Chapter Summary Design Checklist Execute Overview Foundation Concepts Preview Critical Skills Critical Knowledge Methodology Project Execution Administrative Cleanup Chapter Summary Report Overview Foundation Concepts Critical Skills Critical Knowledge Marketing Methodology Report Construction Process Determine Target Audience Delivery Mechanisms Chapter Summary The Final Phase Overview Back To the Beginning Parting Thoughts Appendix A Design Chapter Worksheets Appendix B Report Creation Process Worksheet Appendix C Requirements Sample Appendix D SDLC Checklist Appendix E Recommended Reading 2009-12-02T08:12:57Z 2009-12-02T08:12:57Z 2005 Book http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1447 en application/rar CRC Press