This book aims to do two things. The first is to set out for managers, executives and IT professionals the practical steps necessary to meet today's corporate and IT governance requirements. The second is to provide practical guidance on how board executives and IT professionals can navigate and deploy to best corporate and commercial advantage the numerous IT management and IT governance frameworks and standards - particularly ISO/IEC 38500 - that have been published over the course of the last ten years.
This book aims to do two things. The first is to set out for managers, executives and IT professionals the practical steps necessary to meet today's corporate and IT governance requirements. The second is to provide practical guidance on how board executives and IT professionals can navigate and deploy to best corporate and commercial advantage the numerous IT management and IT governance frameworks and standards - particularly ISO/IEC 38500 - that have been published over the course of the last ten years.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Alan Calder founded IT Governance Ltd in 2002 and began working full-time for the company in 2007. He is now Group CEO of GRC International Group PLC that owns IT Governance Ltd. Before this, Alan had a number of roles including CEO of Business Link London City Partners (a government agency focused on helping growing businesses to develop) from 1995 to 1998, CEO of Focus Central London (a training and enterprise council) from 1998 to 2001, and CEO of Wide Learning (a supplier of elearning) from 2001 to 2003 and the Outsourced Training Company (2005). He was also chairman of CEME (a public-private sector skills partnership) from 2006 to 2011.Alan is an acknowledged international cyber security guru and a leading author on information security and IT governance issues. He has been involved in the development of a wide range of information security management training courses that have been accredited by IBITGQ (International Board for IT Governance Qualifications). Alan has consulted for clients in the UK and abroad, and is a regular media commentator and speaker.
Inhaltsangabe
Chapter 01: Why is information security necessary?; Chapter 02: The UK combined code, the FRC risk guidance and Sarbanes Oxley; Chapter 03: ISO27001; Chapter 04: Organizing information security; Chapter 05: Information security policy and scope; Chapter 06: The risk assessment and Statement of Applicability; Chapter 07: Mobile devices; Chapter 08: Human resources security; Chapter 09: Asset management; Chapter 10: Media handling; Chapter 11: Access control; Chapter 12: User access management; Chapter 13: System and application access control; Chapter 14: Cryptography; Chapter 15: Physical and environmental security; Chapter 16: Equipment security; Chapter 17: Operations security; Chapter 18: Controls against malicious software (malware); Chapter 19: Communications management; Chapter 20: Exchanges of information; Chapter 21: System acquisition, development and maintenance; Chapter 22: Development and support processes; Chapter 23: Supplier relationships; Chapter 24: Monitoring and information security incident management; Chapter 25: Business and information security continuity management; Chapter 26: Compliance; Chapter 27: The ISO27001 audit
Chapter 01: Why is information security necessary?; Chapter 02: The UK combined code, the FRC risk guidance and Sarbanes Oxley; Chapter 03: ISO27001; Chapter 04: Organizing information security; Chapter 05: Information security policy and scope; Chapter 06: The risk assessment and Statement of Applicability; Chapter 07: Mobile devices; Chapter 08: Human resources security; Chapter 09: Asset management; Chapter 10: Media handling; Chapter 11: Access control; Chapter 12: User access management; Chapter 13: System and application access control; Chapter 14: Cryptography; Chapter 15: Physical and environmental security; Chapter 16: Equipment security; Chapter 17: Operations security; Chapter 18: Controls against malicious software (malware); Chapter 19: Communications management; Chapter 20: Exchanges of information; Chapter 21: System acquisition, development and maintenance; Chapter 22: Development and support processes; Chapter 23: Supplier relationships; Chapter 24: Monitoring and information security incident management; Chapter 25: Business and information security continuity management; Chapter 26: Compliance; Chapter 27: The ISO27001 audit
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826