David Clarke
Information Security Management
Compliance for Global Data Security Excellence (ISO 27001, ISO 27002 and SOC 2)
David Clarke
Information Security Management
Compliance for Global Data Security Excellence (ISO 27001, ISO 27002 and SOC 2)
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Achieve cybersecurity excellence by implementing a robust information security management system that meets the requirements of information security standard ISO 27001, its supporting guidance ISO 27002 and data security framework SOC 2.
Andere Kunden interessierten sich auch für
- Chaitra M HardisonBuilding the Best Offensive and Defensive Cyber Workforce48,99 €
- Be Cyber Secure: Tales, Tools and Threats22,99 €
- Don SnyderWing-Level Mission Assurance for a Cyber-Contested Environment33,99 €
- Chaitra HardisonBuilding the Best Offensive and Defensive Cyber Workforce26,99 €
- Helen RideoutEmployee Risk Management65,99 €
- Michael WorkmanInformation Security Management129,99 €
- Jean-Christophe GaillardThe Cybersecurity Spiral of Failure (and How to Break Out of It)18,99 €
-
-
-
Achieve cybersecurity excellence by implementing a robust information security management system that meets the requirements of information security standard ISO 27001, its supporting guidance ISO 27002 and data security framework SOC 2.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Kogan Page
- Seitenzahl: 416
- Erscheinungstermin: 3. Juni 2025
- Englisch
- Abmessung: 234mm x 156mm
- ISBN-13: 9781398618916
- ISBN-10: 1398618918
- Artikelnr.: 70355250
- Herstellerkennzeichnung
- Kogan Page
- 45 Gee Street
- EC1V 3RS London, GB
- 0044 2072780433
- Verlag: Kogan Page
- Seitenzahl: 416
- Erscheinungstermin: 3. Juni 2025
- Englisch
- Abmessung: 234mm x 156mm
- ISBN-13: 9781398618916
- ISBN-10: 1398618918
- Artikelnr.: 70355250
- Herstellerkennzeichnung
- Kogan Page
- 45 Gee Street
- EC1V 3RS London, GB
- 0044 2072780433
David Clarke is an internationally known security, ISO 27001 and GDPR advisor and has been recognized by multiple outlets including Onalytica, Thomson Reuters and Thinkers 360 as a top thought leader in cybersecurity, privacy and security. His company, Visco, offers risk and compliance services to organizations to help them meet privacy and cybersecurity requirements and standards. Clarke has held multiple security management and leadership positions for a number of Global FTSE 100 companies, has managed multiple global security operations centres and is the founder of the GDPR Technology Forum. He also authored the only online data breach course accredited by the National Cyber Security Centre (NCSC) and is the co-author of a GDPR Audit Scheme approved by The ICO (Information Commissioner's Office). He is based in London, UK.
Section
ONE: Foundations of ISO 27001, Objective Setting, Internal Auditing, Strategic Advantages, and Risks of Technical Decision Making Chapter
01: introduction to ISO 27001; Chapter
02: Historical Evolution: From BS7799 to ISO 27001; Chapter
03: Demystifying ISO 27001: Objectives to Training; Chapter
04: Creating Objectives, KPIs, and Metrics; Chapter
05: Internal Audit and Gap Analysis; Chapter
06: Continuous Auditing; Chapter
07: Strategic Advantages of ISO 27001; Chapter
08: Risks of Relying on Technical Decision Making; Section
TWO: Practical Applications, Leadership, and Documentation Chapter
09: Practical Cyber Risk Mitigation Plans; Chapter
10: Comprehensive Audit Management; Chapter
11: Expert Documentation & Procedures; Chapter
12: Presenting Documentation for Steering Group Approval; Chapter
13: Architecture of Documents; Chapter
14: Leadership in Steering Group Management; Section
THREE: Excellence in Auditing, Stakeholder Engagement, Leadership Buy
in, and Leveraging Key Domains under ISO 27001 Chapter
15: Preparing for Audit; Chapter
16: Briefing Stakeholders; Chapter
17: Ensuring Senior Leadership Buy
in; Chapter
18: Detailed Audit Micro
management; Chapter
19: Exceeding Industry Benchmarks; Chapter
20: Continuous Support & Expertise; Chapter
21: Leveraging Key Domains for ISO 27001 Excellence; Section
FOUR: Designing Awareness and Training Programs, Challenges, Nonconformity Management, Technical Audits Integration, Responsibilities, and Strategic Incident Management Chapter
22: Designing Awareness and Training Programs; Chapter
23: Challenges in ISO 27001 Implementation; Chapter
24: Managing Nonconformities; Chapter
25: Integrating Results of Technical Audits into ISO Management; Chapter
26: Joint, Shared, Cost, and Regulatory Responsibilities; Chapter
27: Leveraging Incident Response and Vendor Due Diligence; Chapter
28: Business Continuity Planning and Influencing Incident Outcomes; Chapter
29: Change Control and Best Practice Implementation Auditing; Chapter
30: Building an SOA (Statement of Applicability); Section
FIVE: The Future of ISO 27001, Regulatory Compliance, and A Legacy of Excellence Chapter
31: Bridging ISO 27001 with SOC2; Chapter
32: Navigating the Surge of Global Cyber and Data Regulations; Chapter
33: Understanding WISP: Mandates Across 25 US States; Chapter
34: Expertise in ISO 27001 and Beyond: A Legacy of Excellence; Chapter
35: A Journey from BS7799 to ISO 27001; Chapter
36: Proven Documentation & Global Recognition; Chapter
37: ISO 27001 as a Business Enabler; Chapter
38: Board and Senior Management Engagement; Chapter
39: Holistic Integration: Transactionally, Intellectually, and Operationally; Chapter
40: The Surge of Cyber and Data Regulation; Chapter
41: A Legacy Since 2005
ONE: Foundations of ISO 27001, Objective Setting, Internal Auditing, Strategic Advantages, and Risks of Technical Decision Making Chapter
01: introduction to ISO 27001; Chapter
02: Historical Evolution: From BS7799 to ISO 27001; Chapter
03: Demystifying ISO 27001: Objectives to Training; Chapter
04: Creating Objectives, KPIs, and Metrics; Chapter
05: Internal Audit and Gap Analysis; Chapter
06: Continuous Auditing; Chapter
07: Strategic Advantages of ISO 27001; Chapter
08: Risks of Relying on Technical Decision Making; Section
TWO: Practical Applications, Leadership, and Documentation Chapter
09: Practical Cyber Risk Mitigation Plans; Chapter
10: Comprehensive Audit Management; Chapter
11: Expert Documentation & Procedures; Chapter
12: Presenting Documentation for Steering Group Approval; Chapter
13: Architecture of Documents; Chapter
14: Leadership in Steering Group Management; Section
THREE: Excellence in Auditing, Stakeholder Engagement, Leadership Buy
in, and Leveraging Key Domains under ISO 27001 Chapter
15: Preparing for Audit; Chapter
16: Briefing Stakeholders; Chapter
17: Ensuring Senior Leadership Buy
in; Chapter
18: Detailed Audit Micro
management; Chapter
19: Exceeding Industry Benchmarks; Chapter
20: Continuous Support & Expertise; Chapter
21: Leveraging Key Domains for ISO 27001 Excellence; Section
FOUR: Designing Awareness and Training Programs, Challenges, Nonconformity Management, Technical Audits Integration, Responsibilities, and Strategic Incident Management Chapter
22: Designing Awareness and Training Programs; Chapter
23: Challenges in ISO 27001 Implementation; Chapter
24: Managing Nonconformities; Chapter
25: Integrating Results of Technical Audits into ISO Management; Chapter
26: Joint, Shared, Cost, and Regulatory Responsibilities; Chapter
27: Leveraging Incident Response and Vendor Due Diligence; Chapter
28: Business Continuity Planning and Influencing Incident Outcomes; Chapter
29: Change Control and Best Practice Implementation Auditing; Chapter
30: Building an SOA (Statement of Applicability); Section
FIVE: The Future of ISO 27001, Regulatory Compliance, and A Legacy of Excellence Chapter
31: Bridging ISO 27001 with SOC2; Chapter
32: Navigating the Surge of Global Cyber and Data Regulations; Chapter
33: Understanding WISP: Mandates Across 25 US States; Chapter
34: Expertise in ISO 27001 and Beyond: A Legacy of Excellence; Chapter
35: A Journey from BS7799 to ISO 27001; Chapter
36: Proven Documentation & Global Recognition; Chapter
37: ISO 27001 as a Business Enabler; Chapter
38: Board and Senior Management Engagement; Chapter
39: Holistic Integration: Transactionally, Intellectually, and Operationally; Chapter
40: The Surge of Cyber and Data Regulation; Chapter
41: A Legacy Since 2005
Section
ONE: Foundations of ISO 27001, Objective Setting, Internal Auditing, Strategic Advantages, and Risks of Technical Decision Making Chapter
01: introduction to ISO 27001; Chapter
02: Historical Evolution: From BS7799 to ISO 27001; Chapter
03: Demystifying ISO 27001: Objectives to Training; Chapter
04: Creating Objectives, KPIs, and Metrics; Chapter
05: Internal Audit and Gap Analysis; Chapter
06: Continuous Auditing; Chapter
07: Strategic Advantages of ISO 27001; Chapter
08: Risks of Relying on Technical Decision Making; Section
TWO: Practical Applications, Leadership, and Documentation Chapter
09: Practical Cyber Risk Mitigation Plans; Chapter
10: Comprehensive Audit Management; Chapter
11: Expert Documentation & Procedures; Chapter
12: Presenting Documentation for Steering Group Approval; Chapter
13: Architecture of Documents; Chapter
14: Leadership in Steering Group Management; Section
THREE: Excellence in Auditing, Stakeholder Engagement, Leadership Buy
in, and Leveraging Key Domains under ISO 27001 Chapter
15: Preparing for Audit; Chapter
16: Briefing Stakeholders; Chapter
17: Ensuring Senior Leadership Buy
in; Chapter
18: Detailed Audit Micro
management; Chapter
19: Exceeding Industry Benchmarks; Chapter
20: Continuous Support & Expertise; Chapter
21: Leveraging Key Domains for ISO 27001 Excellence; Section
FOUR: Designing Awareness and Training Programs, Challenges, Nonconformity Management, Technical Audits Integration, Responsibilities, and Strategic Incident Management Chapter
22: Designing Awareness and Training Programs; Chapter
23: Challenges in ISO 27001 Implementation; Chapter
24: Managing Nonconformities; Chapter
25: Integrating Results of Technical Audits into ISO Management; Chapter
26: Joint, Shared, Cost, and Regulatory Responsibilities; Chapter
27: Leveraging Incident Response and Vendor Due Diligence; Chapter
28: Business Continuity Planning and Influencing Incident Outcomes; Chapter
29: Change Control and Best Practice Implementation Auditing; Chapter
30: Building an SOA (Statement of Applicability); Section
FIVE: The Future of ISO 27001, Regulatory Compliance, and A Legacy of Excellence Chapter
31: Bridging ISO 27001 with SOC2; Chapter
32: Navigating the Surge of Global Cyber and Data Regulations; Chapter
33: Understanding WISP: Mandates Across 25 US States; Chapter
34: Expertise in ISO 27001 and Beyond: A Legacy of Excellence; Chapter
35: A Journey from BS7799 to ISO 27001; Chapter
36: Proven Documentation & Global Recognition; Chapter
37: ISO 27001 as a Business Enabler; Chapter
38: Board and Senior Management Engagement; Chapter
39: Holistic Integration: Transactionally, Intellectually, and Operationally; Chapter
40: The Surge of Cyber and Data Regulation; Chapter
41: A Legacy Since 2005
ONE: Foundations of ISO 27001, Objective Setting, Internal Auditing, Strategic Advantages, and Risks of Technical Decision Making Chapter
01: introduction to ISO 27001; Chapter
02: Historical Evolution: From BS7799 to ISO 27001; Chapter
03: Demystifying ISO 27001: Objectives to Training; Chapter
04: Creating Objectives, KPIs, and Metrics; Chapter
05: Internal Audit and Gap Analysis; Chapter
06: Continuous Auditing; Chapter
07: Strategic Advantages of ISO 27001; Chapter
08: Risks of Relying on Technical Decision Making; Section
TWO: Practical Applications, Leadership, and Documentation Chapter
09: Practical Cyber Risk Mitigation Plans; Chapter
10: Comprehensive Audit Management; Chapter
11: Expert Documentation & Procedures; Chapter
12: Presenting Documentation for Steering Group Approval; Chapter
13: Architecture of Documents; Chapter
14: Leadership in Steering Group Management; Section
THREE: Excellence in Auditing, Stakeholder Engagement, Leadership Buy
in, and Leveraging Key Domains under ISO 27001 Chapter
15: Preparing for Audit; Chapter
16: Briefing Stakeholders; Chapter
17: Ensuring Senior Leadership Buy
in; Chapter
18: Detailed Audit Micro
management; Chapter
19: Exceeding Industry Benchmarks; Chapter
20: Continuous Support & Expertise; Chapter
21: Leveraging Key Domains for ISO 27001 Excellence; Section
FOUR: Designing Awareness and Training Programs, Challenges, Nonconformity Management, Technical Audits Integration, Responsibilities, and Strategic Incident Management Chapter
22: Designing Awareness and Training Programs; Chapter
23: Challenges in ISO 27001 Implementation; Chapter
24: Managing Nonconformities; Chapter
25: Integrating Results of Technical Audits into ISO Management; Chapter
26: Joint, Shared, Cost, and Regulatory Responsibilities; Chapter
27: Leveraging Incident Response and Vendor Due Diligence; Chapter
28: Business Continuity Planning and Influencing Incident Outcomes; Chapter
29: Change Control and Best Practice Implementation Auditing; Chapter
30: Building an SOA (Statement of Applicability); Section
FIVE: The Future of ISO 27001, Regulatory Compliance, and A Legacy of Excellence Chapter
31: Bridging ISO 27001 with SOC2; Chapter
32: Navigating the Surge of Global Cyber and Data Regulations; Chapter
33: Understanding WISP: Mandates Across 25 US States; Chapter
34: Expertise in ISO 27001 and Beyond: A Legacy of Excellence; Chapter
35: A Journey from BS7799 to ISO 27001; Chapter
36: Proven Documentation & Global Recognition; Chapter
37: ISO 27001 as a Business Enabler; Chapter
38: Board and Senior Management Engagement; Chapter
39: Holistic Integration: Transactionally, Intellectually, and Operationally; Chapter
40: The Surge of Cyber and Data Regulation; Chapter
41: A Legacy Since 2005