At the same time that information security organizations face significant budgetary challenges, both cyber security threats and compliance requirements have escalated. This book describes actionable techniques for running an information-security management program during an era that has been known for cost-cutting to information security budgets. The concept is to allow practitioners to acquire skills at fiscal proficiency in managing information security issues, allowing them to deliver effective and efficient service while working within the restricted budgetary environment that exists at many information-security organizations.…mehr
At the same time that information security organizations face significant budgetary challenges, both cyber security threats and compliance requirements have escalated. This book describes actionable techniques for running an information-security management program during an era that has been known for cost-cutting to information security budgets. The concept is to allow practitioners to acquire skills at fiscal proficiency in managing information security issues, allowing them to deliver effective and efficient service while working within the restricted budgetary environment that exists at many information-security organizations.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Kerry A. Anderson , CISA, CISM, CRISC, CGEIT, CISSP, ISSMP, ISSAP, CSSLP, CFE, CCSK, MBA, MSCIS, MSIA, is an information security and records management consultant with more than 15 years of experience in information security and IT across a variety of industries. She has worked in information security, application development, financial systems operations, network administration, IT audit, records management, business contingency planning, and graduate-program instruction.
Inhaltsangabe
New Normal. Information Security Maturity Life Cycle. Reducing Complexity. Frugal Hiring. Frugal Team Management. Managing External Parties Effectively. Security Awareness: Fluff or Strategic Investment? Information Security Policies and Procedures. Is This Necessary? Understand the Budgeting Cycle. Using the Goldilocks Principle. The Hybrid (Frugal) CISO. Frugality as a Continuing Strategy for Information Security Management.
New Normal. Information Security Maturity Life Cycle. Reducing Complexity. Frugal Hiring. Frugal Team Management. Managing External Parties Effectively. Security Awareness: Fluff or Strategic Investment? Information Security Policies and Procedures. Is This Necessary? Understand the Budgeting Cycle. Using the Goldilocks Principle. The Hybrid (Frugal) CISO. Frugality as a Continuing Strategy for Information Security Management.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497