Information security for non-technical managers

  • 2 Currently reading
Locate

My Reading Lists:

Create a new list


  • 2 Currently reading

Buy this book

Last edited by ISBNbot2
August 22, 2020 | History

Information security for non-technical managers

  • 2 Currently reading

This book presents a non-technical overview of the main elements of managing information security, where everyone, not just technical people, has a role to play.

You can download the book via the link below.

Publish Date
Publisher
Bookboon.com

Buy this book

Book Details


Table of Contents

Content
About the author
Introduction
1. Information security in context
1.1. A short history of information technologies and their side effects
1.2. Why information security is increasingly important
1.3. Ubiquity and irreversible dependencies
2. Lessons identified in the last ten years
2.1. The semantics of information security
2.2. The major target areas in information insecurity
2.3. What needs to be done to strengthen security is well known but not done well enough
2.4. Certifications
2.5. Asymmetries and consequences
2.6. Maintaining security is everybody’s job
3. Defining information security
3.1. What is meant by “Information Security”
3.2. Differences between Enterprise security, Information security and Information Technology security
4. Managing information security in the enterprise
4.1. Information Security Governance
4.2. The components of information security governance
4.3. Managing for security
4.4. What makes a good Chief Information Security Officer (CISO)
4.5. Your role as a manager
5. The four domains of vulnerabilities
5.1. Governance vulnerabilities
5.2. People vulnerabilities
5.3. Process vulnerabilities
5.4. Technology vulnerabilities
6. Other drivers of information insecurity
6.1. Causes for concern
6.2. External factors: the constantly changing landscape
6.3. Information security should not inhibit innovative thinking
7. Measuring security
7.1. Measuring Information Security
7.2. Reporting information security metrics
8. Other information security topics
8.1. Business Impact Analysis (BIA)
8.2. Information Risk Management
8.3. Planning for survival
8.4. The legislative landscape
9. Conclusions
10. References
10.1. Downloadable free of charge:
10.2. Material requiring purchase
10.3. Topics not covered in this book
11. Appendix: Acknowledgements
12. Endnotes

Edition Identifiers

Open Library
OL25742803M
ISBN 13
9788740304886

Work Identifiers

Work ID
OL17172117W

Links outside Open Library

Community Reviews (0)

No community reviews have been submitted for this work.

Lists

History

Download catalog record: RDF / JSON / OPDS | Wikipedia citation
August 22, 2020 Edited by ISBNbot2 normalize ISBN
July 20, 2015 Edited by Alice Kirk Edited without comment.
July 20, 2015 Edited by Alice Kirk Added new cover
July 20, 2015 Created by Alice Kirk Added new book.