Mark Scherling
Practical Risk Management for the CIO (eBook, PDF)
48,95 €
48,95 €
inkl. MwSt.
Sofort per Download lieferbar
24 °P sammeln
48,95 €
Als Download kaufen
48,95 €
inkl. MwSt.
Sofort per Download lieferbar
24 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
48,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
24 °P sammeln
Mark Scherling
Practical Risk Management for the CIO (eBook, PDF)
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
The growing complexity of today's interconnected systems has not only increased the need for improved information security, but also helped to move information from the IT backroom to the executive boardroom as a strategic asset. And, just like the tip of an iceberg is all you see until you run into it, the risks to your information are mostly invi
- Geräte: PC
- mit Kopierschutz
- eBook Hilfe
- Größe: 7.56MB
Andere Kunden interessierten sich auch für
- Kerry Ann AndersonThe Frugal CISO (eBook, PDF)37,95 €
- Rebecca HeroldData Privacy for the Smart Grid (eBook, PDF)0,99 €
- Paul LambertUnderstanding the New European Data Protection Rules (eBook, PDF)37,95 €
- James BoneCognitive Risk (eBook, PDF)36,95 €
- John W. RittinghouseCloud Computing (eBook, PDF)72,95 €
- Ian LimSecuring Cloud and Mobility (eBook, PDF)49,95 €
- Lynn FountainEthics and the Internal Auditor's Political Dilemma (eBook, PDF)65,95 €
-
-
-
The growing complexity of today's interconnected systems has not only increased the need for improved information security, but also helped to move information from the IT backroom to the executive boardroom as a strategic asset. And, just like the tip of an iceberg is all you see until you run into it, the risks to your information are mostly invi
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis
- Seitenzahl: 399
- Erscheinungstermin: 19. April 2016
- Englisch
- ISBN-13: 9781439856543
- Artikelnr.: 38303230
- Verlag: Taylor & Francis
- Seitenzahl: 399
- Erscheinungstermin: 19. April 2016
- Englisch
- ISBN-13: 9781439856543
- Artikelnr.: 38303230
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Mark Scherling, CISSP, CRM, has been working in IT for over 30 years. For the past four years, he has been managing information security and privacy for the Justice Sector in the Government of British Columbia (Canada). Prior to the Justice Sector, he managed the Information Security Investigations Unit for the entire BC government.
He has designed and implemented public key infrastructure (PKI) and security solutions for numerous clients. He is considered a Subject Matter Expert in Risk Management and Information Security by the Information Systems Audit and Control Association (ISACA). He contributed to the Risk IT Framework and Certification in Risk and Information Systems (CRISC), a new ISACA Certification. He is viewed as a Security and Risk Management Expert by many people within and associated with the Government of British Columbia.
His background includes sales, marketing, and information management. In the mid-1990s, he was instrumental in developing and implementing the Canadian Department of National Defence Intranet or the DIN. He has significant experience in information and knowledge management. He combines this expertise with information protection to create an information risk management strategy for Chief Information Officers (CIOs).
He has been part of the evolution of information technology (IT) from Digital Equipment's Vaxes and PDP11s to mobile computing, the Internet, and cloud computing. The interconnected world we now live in holds exciting promise to link people, computers, applications, and information. There are risks when we link everything together and share information. Organizations are always trying to reduce costs and improve customer relations. Mark has been involved in information security for over 13 years and has oriented his approach from simple information security to risk management strategies. As the Internet continues to evolve, so evolves information se
He has designed and implemented public key infrastructure (PKI) and security solutions for numerous clients. He is considered a Subject Matter Expert in Risk Management and Information Security by the Information Systems Audit and Control Association (ISACA). He contributed to the Risk IT Framework and Certification in Risk and Information Systems (CRISC), a new ISACA Certification. He is viewed as a Security and Risk Management Expert by many people within and associated with the Government of British Columbia.
His background includes sales, marketing, and information management. In the mid-1990s, he was instrumental in developing and implementing the Canadian Department of National Defence Intranet or the DIN. He has significant experience in information and knowledge management. He combines this expertise with information protection to create an information risk management strategy for Chief Information Officers (CIOs).
He has been part of the evolution of information technology (IT) from Digital Equipment's Vaxes and PDP11s to mobile computing, the Internet, and cloud computing. The interconnected world we now live in holds exciting promise to link people, computers, applications, and information. There are risks when we link everything together and share information. Organizations are always trying to reduce costs and improve customer relations. Mark has been involved in information security for over 13 years and has oriented his approach from simple information security to risk management strategies. As the Internet continues to evolve, so evolves information se
Introduction: Why Risk Management? Liability. Service Delivery. PRINCIPLES
AND CONCEPTS. Overview. Basic Concepts, Principles, and Practices. Risk
Assessment, Analysis, and Procedures. Metrics. Best Practices. SERVICE
DELIVERY. Product Management. Process Management. Project Management. IT
Service Management. Reporting on Service Delivery. LIABILITIES MANAGEMENT.
Information Management. Information Protection. E-Discovery. Privacy.
Policies and Procedures. Planning for Big Failures or Business Continuity.
PUTTING IT ALL TOGETHER. Designing a Risk Management Strategy.
Forward-Looking Risk Management. Preparing for a "Black Swan". APPENDICES:
OECD Privacy Principles. Project Profiling Risk Assessment. Risk Impact
Scales. Classification Schema.
AND CONCEPTS. Overview. Basic Concepts, Principles, and Practices. Risk
Assessment, Analysis, and Procedures. Metrics. Best Practices. SERVICE
DELIVERY. Product Management. Process Management. Project Management. IT
Service Management. Reporting on Service Delivery. LIABILITIES MANAGEMENT.
Information Management. Information Protection. E-Discovery. Privacy.
Policies and Procedures. Planning for Big Failures or Business Continuity.
PUTTING IT ALL TOGETHER. Designing a Risk Management Strategy.
Forward-Looking Risk Management. Preparing for a "Black Swan". APPENDICES:
OECD Privacy Principles. Project Profiling Risk Assessment. Risk Impact
Scales. Classification Schema.
Introduction: Why Risk Management? Liability. Service Delivery. PRINCIPLES
AND CONCEPTS. Overview. Basic Concepts, Principles, and Practices. Risk
Assessment, Analysis, and Procedures. Metrics. Best Practices. SERVICE
DELIVERY. Product Management. Process Management. Project Management. IT
Service Management. Reporting on Service Delivery. LIABILITIES MANAGEMENT.
Information Management. Information Protection. E-Discovery. Privacy.
Policies and Procedures. Planning for Big Failures or Business Continuity.
PUTTING IT ALL TOGETHER. Designing a Risk Management Strategy.
Forward-Looking Risk Management. Preparing for a "Black Swan". APPENDICES:
OECD Privacy Principles. Project Profiling Risk Assessment. Risk Impact
Scales. Classification Schema.
AND CONCEPTS. Overview. Basic Concepts, Principles, and Practices. Risk
Assessment, Analysis, and Procedures. Metrics. Best Practices. SERVICE
DELIVERY. Product Management. Process Management. Project Management. IT
Service Management. Reporting on Service Delivery. LIABILITIES MANAGEMENT.
Information Management. Information Protection. E-Discovery. Privacy.
Policies and Procedures. Planning for Big Failures or Business Continuity.
PUTTING IT ALL TOGETHER. Designing a Risk Management Strategy.
Forward-Looking Risk Management. Preparing for a "Black Swan". APPENDICES:
OECD Privacy Principles. Project Profiling Risk Assessment. Risk Impact
Scales. Classification Schema.