Information Protection Playbook
  • Author : Greg Kane
  • Release Date : 17 September 2013
  • Publisher : Elsevier
  • Genre : Computers
  • Pages : 128
  • ISBN 13 : 9780124172425

Information Protection Playbook Book Summary

The primary goal of the Information Protection Playbook is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that protects the applications, systems, and networks that deliver business information from failures of confidentiality, integrity, availability, trust and accountability, and privacy. Using the guidelines provided in the Information Protection Playbook, security and information technology (IT) managers will learn how to implement the five functions of an IP framework: governance, program planning, risk management, incident response management, and program administration. These functions are based on a model promoted by the Information Systems Audit and Control Association (ISACA) and validated by thousands of Certified Information Security Managers. The five functions are further broken down into a series of objectives or milestones to be achieved in order to implement an IP framework. The extensive appendices included at the end of the book make for an excellent resource for the security or IT manager building an IP program from the ground up. They include, for example, a board of directors presentation complete with sample slides; an IP policy document checklist; a risk prioritization procedure matrix, which illustrates how to classify a threat based on a scale of high, medium, and low; a facility management self-assessment questionnaire; and a list of representative job descriptions for roles in IP. The Information Protection Playbook is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs. Emphasizes information protection guidelines that are driven by business objectives, laws, regulations, and industry standards Draws from successful practices in global organizations, benchmarking, advice from a variety of subject-matter experts, and feedback from the organizations involved with the Security Executive Council Includes 11 appendices full of the sample checklists, matrices, and forms that are discussed in the book

Information Protection Playbook

Information Protection Playbook

Author : Greg Kane,Lorna Koppel
Publisher : Elsevier
Genre : Computers
Total View : 370 Views
File Size : 45,9 Mb
Get Book

The primary goal of the Information Protection Playbook is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that protects the applications, systems, and networks that deliver business information from ...

Information Protection Playbook

Information Protection Playbook

Author : Greg Kane,Lorna Koppel
Publisher : Elsevier Science Limited
Genre : Computers
Total View : 2949 Views
File Size : 40,9 Mb
Get Book

The primary goal of the Information Protection Playbook is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that protects the applications, systems, and networks that deliver business information from ...

Ransomware Protection Playbook

Ransomware Protection Playbook

Author : Roger A. Grimes
Publisher : John Wiley & Sons
Genre : Computers
Total View : 4860 Views
File Size : 50,8 Mb
Get Book

Avoid becoming the next ransomware victim by taking practical steps today Colonial Pipeline. CWT Global. Brenntag. Travelex. The list of ransomware victims is long, distinguished, and sophisticated. And it’s growing longer every day. In Ransomware Protection Playbook, computer security veteran and expert penetration tester Roger A. Grimes delivers an ...

Physical Security Strategy and Process Playbook

Physical Security Strategy and Process Playbook

Author : John Kingsley-Hefty
Publisher : Elsevier
Genre : Social Science
Total View : 859 Views
File Size : 40,8 Mb
Get Book

The Physical Security Strategy and Process Playbook is a concise yet comprehensive treatment of physical security management in the business context. It can be used as an educational tool, help a security manager define security requirements, and serve as a reference for future planning. This book is organized into six ...

Auditing Cloud Computing

Auditing Cloud Computing

Author : Ben Halpert
Publisher : John Wiley & Sons
Genre : Business & Economics
Total View : 8334 Views
File Size : 48,5 Mb
Get Book

The auditor's guide to ensuring correct security and privacy practices in a cloud computing environment Many organizations are reporting or projecting a significant cost savings through the use of cloud computing—utilizing shared computing resources to provide ubiquitous access for organizations and end users. Just as many organizations, however, are ...

The Security Culture Playbook

The Security Culture Playbook

Author : Perry Carpenter,Kai Roer
Publisher : John Wiley & Sons
Genre : Computers
Total View : 3563 Views
File Size : 48,8 Mb
Get Book

Mitigate human risk and bake security into your organization’s culture from top to bottom with insights from leading experts in security awareness, behavior, and culture. The topic of security culture is mysterious and confusing to most leaders. But it doesn’t have to be. In The Security Culture Playbook, ...

The Cybersecurity Playbook for Modern Enterprises

The Cybersecurity Playbook for Modern Enterprises

Author : Jeremy Wittkop
Publisher : Packt Publishing Ltd
Genre : Computers
Total View : 408 Views
File Size : 40,8 Mb
Get Book

Learn how to build a cybersecurity program for a changing world with the help of proven best practices and emerging techniques Key FeaturesUnderstand what happens in an attack and build the proper defenses to secure your organizationDefend against hacking techniques such as social engineering, phishing, and many morePartner with your ...

Workplace Security Playbook

Workplace Security Playbook

Author : Bob Hayes
Publisher : Elsevier
Genre : Social Science
Total View : 3427 Views
File Size : 48,5 Mb
Get Book

Workplace Security Playbook: The New Manager’s Guide to Security Risk is a set of comprehensive risk management guidelines for companies that have other business functions coordinating security. When an employee without a security background is charged with the protection of people, facilities, or assets, the Workplace Security Playbook can ...