Todd Fitzgerald
Information Security Governance Simplified (eBook, ePUB)
From the Boardroom to the Keyboard
0,99 €
0,99 €
inkl. MwSt.
Sofort per Download lieferbar
0 °P sammeln
0,99 €
Als Download kaufen
0,99 €
inkl. MwSt.
Sofort per Download lieferbar
0 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
0,99 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
0 °P sammeln
Todd Fitzgerald
Information Security Governance Simplified (eBook, ePUB)
From the Boardroom to the Keyboard
- Format: ePub
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program a
- Geräte: eReader
- mit Kopierschutz
- eBook Hilfe
- Größe: 6.9MB
Andere Kunden interessierten sich auch für
- Thomas R. PeltierInformation Security Policies and Procedures (eBook, ePUB)103,95 €
- Amanda AndressSurviving Security (eBook, ePUB)49,95 €
- James S. TillerAdaptive Security Management Architecture (eBook, ePUB)49,95 €
- John MccumberAssessing and Managing Security Risk in IT Systems (eBook, ePUB)60,95 €
- James S. TillerThe Ethical Hack (eBook, ePUB)49,95 €
- Alan B. SterneckertCritical Incident Management (eBook, ePUB)49,95 €
- Patrick D. HowardOfficial (ISC)2 Guide to the CAP CBK (eBook, ePUB)60,95 €
-
-
-
Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program a
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis
- Seitenzahl: 431
- Erscheinungstermin: 19. April 2016
- Englisch
- ISBN-13: 9781466551282
- Artikelnr.: 38317357
- Verlag: Taylor & Francis
- Seitenzahl: 431
- Erscheinungstermin: 19. April 2016
- Englisch
- ISBN-13: 9781466551282
- Artikelnr.: 38317357
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Todd Fitzgerald, CISSP, CISA, CISM, ISO27000, CGEIT, PMP, HITRUST, and ITILV3 certified, is responsible for external audit technical compliance for National Government Services (NGS), Milwaukee, WI, one of the largest processors of Medicare claims and a subsidiary of WellPoint, Inc., the nation's leading health benefits company, serving 1 out of 9 Americans. Fitzgerald has initiated, developed, and led information security programs as the Information Security Officer for several companies. Fitzgerald served as the chair/co-chair for the 2011/2010 ISACA North America and Europe Information Security & Risk Management conferences.
Fitzgerald coauthored, with Micki Krause, the 2008 (ISC)2 Press book titled CISO Leadership: Essential Principles for Success. Fitzgerald has authored articles on information security for the 2007 Official (ISC)2 Guide to the CISSP Exam, The Information Security Handbook Series (2003-2012), The HIPAA Program Reference Book, Managing an Information Security and Privacy Awareness and Training Program, CISM Review Manual, and several other security-related publications. He is also a member of the editorial board for (ISC)2 Journal/Information Systems Security Magazine. Fitzgerald is frequently called upon to present at international, national, and local conferences for Information Systems Audit and Control Association (ISACA), Computer Security Institute (CSI), Information Systems Security Association (ISSA), Management Information Systems Training Institute (MISTI), COSAC, and the Centers for Medicare & Medicaid Services (CMS) systems security officer community. He also serves on the board of directors for the HIPAA Collaborative of Wisconsin and several other industry groups. Fitzgerald has received several awards including a Midwest Information Security Executive of the Year Award Finalist award and Health Ethics Trust HIPAA Implementation Awa
Fitzgerald coauthored, with Micki Krause, the 2008 (ISC)2 Press book titled CISO Leadership: Essential Principles for Success. Fitzgerald has authored articles on information security for the 2007 Official (ISC)2 Guide to the CISSP Exam, The Information Security Handbook Series (2003-2012), The HIPAA Program Reference Book, Managing an Information Security and Privacy Awareness and Training Program, CISM Review Manual, and several other security-related publications. He is also a member of the editorial board for (ISC)2 Journal/Information Systems Security Magazine. Fitzgerald is frequently called upon to present at international, national, and local conferences for Information Systems Audit and Control Association (ISACA), Computer Security Institute (CSI), Information Systems Security Association (ISSA), Management Information Systems Training Institute (MISTI), COSAC, and the Centers for Medicare & Medicaid Services (CMS) systems security officer community. He also serves on the board of directors for the HIPAA Collaborative of Wisconsin and several other industry groups. Fitzgerald has received several awards including a Midwest Information Security Executive of the Year Award Finalist award and Health Ethics Trust HIPAA Implementation Awa
Getting Information Security Right - Top to Bottom. Developing Information
Strategy. Defining the Security Management Organization. Interacting with
the C-Suite. Managing Risk to an Acceptable Level. Creating Effective
Information Security Policies. Security Compliance Using Control
Frameworks. Managerial Controls - Practical Security Considerations.
Technical Controls - Practical Security Considerations. Operational
Controls - Practical Security Considerations. The Auditors Have Arrived -
Now What? Effective Security Communications. The Law and Information
Security. Learning From Information Security Incidents. 17 Ways to
Dismantle Information Security Efforts.
Strategy. Defining the Security Management Organization. Interacting with
the C-Suite. Managing Risk to an Acceptable Level. Creating Effective
Information Security Policies. Security Compliance Using Control
Frameworks. Managerial Controls - Practical Security Considerations.
Technical Controls - Practical Security Considerations. Operational
Controls - Practical Security Considerations. The Auditors Have Arrived -
Now What? Effective Security Communications. The Law and Information
Security. Learning From Information Security Incidents. 17 Ways to
Dismantle Information Security Efforts.
Getting Information Security Right - Top to Bottom. Developing Information
Strategy. Defining the Security Management Organization. Interacting with
the C-Suite. Managing Risk to an Acceptable Level. Creating Effective
Information Security Policies. Security Compliance Using Control
Frameworks. Managerial Controls - Practical Security Considerations.
Technical Controls - Practical Security Considerations. Operational
Controls - Practical Security Considerations. The Auditors Have Arrived -
Now What? Effective Security Communications. The Law and Information
Security. Learning From Information Security Incidents. 17 Ways to
Dismantle Information Security Efforts.
Strategy. Defining the Security Management Organization. Interacting with
the C-Suite. Managing Risk to an Acceptable Level. Creating Effective
Information Security Policies. Security Compliance Using Control
Frameworks. Managerial Controls - Practical Security Considerations.
Technical Controls - Practical Security Considerations. Operational
Controls - Practical Security Considerations. The Auditors Have Arrived -
Now What? Effective Security Communications. The Law and Information
Security. Learning From Information Security Incidents. 17 Ways to
Dismantle Information Security Efforts.