This book aims to do two things. The first is to set out for managers, executives and IT professionals the practical steps necessary to meet today's corporate and IT governance requirements. The second is to provide practical guidance on how board executives and IT professionals can navigate and deploy to best corporate and commercial advantage the numerous IT management and IT governance frameworks and standards - particularly ISO/IEC 38500 - that have been published over the course of the last ten years.
This book aims to do two things. The first is to set out for managers, executives and IT professionals the practical steps necessary to meet today's corporate and IT governance requirements. The second is to provide practical guidance on how board executives and IT professionals can navigate and deploy to best corporate and commercial advantage the numerous IT management and IT governance frameworks and standards - particularly ISO/IEC 38500 - that have been published over the course of the last ten years.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Die Herstellerinformationen sind derzeit nicht verfügbar.
Autorenporträt
Alan Calder is a leading author on IT governance and information security issues. He is the CEO of GRC International Group plc, the AIM-listed company that owns IT Governance Ltd. Alan is an acknowledged international cyber security guru. He has been involved in the development of a wide range of information security management training courses that have been accredited by the International Board for IT Governance Qualifications (IBITGQ). He is a frequent media commentator on information security and IT governance issues, and has contributed articles and expert comment to a wide range of trade, national and online news outlets. Steve G Watkins leads the consultancy and training services of IT Governance Ltd. In his various roles in both the public and private sectors he has been responsible for most support disciplines. He has over 20 years' experience of managing integrated management systems, and is a lead auditor for ISO27001 and ISO9000. He is now an ISMS Technical Expert for UKAS, and provides them with advice for their assessments of certification bodies offering certification to ISO27001.
Inhaltsangabe
Chapter 01: Why is information security necessary?; Chapter 02: The UK combined code, the FRC risk guidance and Sarbanes Oxley; Chapter 03: ISO27001; Chapter 04: Organizing information security; Chapter 05: Information security policy and scope; Chapter 06: The risk assessment and Statement of Applicability; Chapter 07: Mobile devices; Chapter 08: Human resources security; Chapter 09: Asset management; Chapter 10: Media handling; Chapter 11: Access control; Chapter 12: User access management; Chapter 13: System and application access control; Chapter 14: Cryptography; Chapter 15: Physical and environmental security; Chapter 16: Equipment security; Chapter 17: Operations security; Chapter 18: Controls against malicious software (malware); Chapter 19: Communications management; Chapter 20: Exchanges of information; Chapter 21: System acquisition, development and maintenance; Chapter 22: Development and support processes; Chapter 23: Supplier relationships; Chapter 24: Monitoring and information security incident management; Chapter 25: Business and information security continuity management; Chapter 26: Compliance; Chapter 27: The ISO27001 audit
Chapter 01: Why is information security necessary?; Chapter 02: The UK combined code, the FRC risk guidance and Sarbanes Oxley; Chapter 03: ISO27001; Chapter 04: Organizing information security; Chapter 05: Information security policy and scope; Chapter 06: The risk assessment and Statement of Applicability; Chapter 07: Mobile devices; Chapter 08: Human resources security; Chapter 09: Asset management; Chapter 10: Media handling; Chapter 11: Access control; Chapter 12: User access management; Chapter 13: System and application access control; Chapter 14: Cryptography; Chapter 15: Physical and environmental security; Chapter 16: Equipment security; Chapter 17: Operations security; Chapter 18: Controls against malicious software (malware); Chapter 19: Communications management; Chapter 20: Exchanges of information; Chapter 21: System acquisition, development and maintenance; Chapter 22: Development and support processes; Chapter 23: Supplier relationships; Chapter 24: Monitoring and information security incident management; Chapter 25: Business and information security continuity management; Chapter 26: Compliance; Chapter 27: The ISO27001 audit
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826