49,95 €
49,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
25 °P sammeln
49,95 €
49,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
25 °P sammeln
Als Download kaufen
49,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
25 °P sammeln
Jetzt verschenken
49,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
25 °P sammeln
  • Format: PDF

This volume enables security professionals to structure the best security program designed to meet the complex needs of an entire organization, taking into account the organization's business goals as well as the surrounding controls, processes, and units already in existence. The book explains how an organization can develop an adaptive security program closely aligned to business needs, making it an enabling force that helps the organization achieve its goals and objectives. It presents the end product of a successful security management system and examines the finer points of how it can be accomplished.…mehr

Produktbeschreibung
This volume enables security professionals to structure the best security program designed to meet the complex needs of an entire organization, taking into account the organization's business goals as well as the surrounding controls, processes, and units already in existence. The book explains how an organization can develop an adaptive security program closely aligned to business needs, making it an enabling force that helps the organization achieve its goals and objectives. It presents the end product of a successful security management system and examines the finer points of how it can be accomplished.

Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Autorenporträt
  • Presents IT security status using managerial measures of performance such as balanced scorecards
  • Shows how the security of IT relates to risk business analysis
  • Demonstrates how to align the practices of each facet of business so they work together using the same strategies
  • Describes how the facets of a secure IT system are related to the security of suppliers and customers