Complete Guide to Building an Information Security Program

Many organizations today are required to have a formal IT Security Program in place in order to do business with their clients.

An Information Security Program is not intended to be cumbersome or sit and collect dust on the shelf. With the proper planning and know how your information security program can drive business operations and ensure secure processes are followed along the way.

Below is a list of just a few of the items you will learn while reading this book, which will assist you in developing your information security program.

Building an Information Security Program;

Establishing Organizational Security Policies;

Implementing Organizational Security Policies;

Delineating Employee's Security Responsibilities;

Developing Organizational Security Procedures;

Establishing IT Standards & Guidelines;

Implementing Organizational Security Procedures;

Maintaining Operational Security Programs

1143609442
Complete Guide to Building an Information Security Program

Many organizations today are required to have a formal IT Security Program in place in order to do business with their clients.

An Information Security Program is not intended to be cumbersome or sit and collect dust on the shelf. With the proper planning and know how your information security program can drive business operations and ensure secure processes are followed along the way.

Below is a list of just a few of the items you will learn while reading this book, which will assist you in developing your information security program.

Building an Information Security Program;

Establishing Organizational Security Policies;

Implementing Organizational Security Policies;

Delineating Employee's Security Responsibilities;

Developing Organizational Security Procedures;

Establishing IT Standards & Guidelines;

Implementing Organizational Security Procedures;

Maintaining Operational Security Programs

19.11 In Stock
Complete Guide to Building an Information Security Program

Complete Guide to Building an Information Security Program

by David Rauschendorfer
Complete Guide to Building an Information Security Program

Complete Guide to Building an Information Security Program

by David Rauschendorfer

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

Many organizations today are required to have a formal IT Security Program in place in order to do business with their clients.

An Information Security Program is not intended to be cumbersome or sit and collect dust on the shelf. With the proper planning and know how your information security program can drive business operations and ensure secure processes are followed along the way.

Below is a list of just a few of the items you will learn while reading this book, which will assist you in developing your information security program.

Building an Information Security Program;

Establishing Organizational Security Policies;

Implementing Organizational Security Policies;

Delineating Employee's Security Responsibilities;

Developing Organizational Security Procedures;

Establishing IT Standards & Guidelines;

Implementing Organizational Security Procedures;

Maintaining Operational Security Programs


Product Details

ISBN-13: 9781088166529
Publisher: DR Grow
Publication date: 05/26/2023
Sold by: Barnes & Noble
Format: eBook
Pages: 73
File size: 2 MB

Table of Contents

Introduction

Building An Information Security Program

Connecting Policies, Procedures, and IT Standards

Understanding Organizational Culture

Meeting Governance Requirements

Establishing Ongoing Maintenance

Establishing Organizational Security Policies

Selecting a Framework

Developing Policies

Organizational Buy-in

Additional Policies

Implementing Organizational Security Policies

Communicating Policies

Tracking Acknowledgement of Policies

Delivering Training and Awareness

Delineating Employee's Security Responsibilities

Promoting Good Security Practices

Identifying Security Events

Reporting Security Events

Building a Business Partnership

Developing Organizational Security Procedures

Defining Roles by Controls Matrix

Outlining Departmental Procedures

Establishing a Development Strategy

Documenting Exceptions

Establishing IT Standards and Guidelines

Understanding Standards and Guidelines

Structuring the Five Layers

Implementing Guidelines

Managing Third-Party Solutions

Implementing Organizational Security Procedures

Defining Employees' Role in Security

Using Security Standards to Drive Informal Processes

Identifying Solutions to Drive Operations

Maintaining Operational Security Programs

Conducting Annual Security Reviews

Updating IT Standards and Guidelines

Developing a Security-Conscious Culture

From the B&N Reads Blog

Customer Reviews