
Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.
Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente
Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an information security manager. Covering a wealth of information that explains exactly how the industry works today, this book focuses on how you can set up an effective information security practice, hire the right people, and strike the best balance between security controls, costs, and risks.
Practical Information Security Management provides a wealth of practical advice for anyone responsible for information security management in the workplace, focusing on the ‘how’ rather than the ‘what’. Together we’ll cut through the policies, regulations, and standards to expose the real inner workings of what makes a security management program effective, covering the full gamut of subject matter pertaining to security management: organizational structures, security architectures, technical controls, governanceframeworks, and operational security.
This book was not written to help you pass your CISSP, CISM, or CISMP or become a PCI-DSS auditor. It won’t help you build an ISO 27001 or COBIT-compliant security management system, and it won’t help you become an ethical hacker or digital forensics investigator – there are many excellent books on the market that cover these subjects in detail. Instead, this is a practical book that offers years of real-world experience in helping you focus on the getting the job done.
What You Will Learn
Learn the practical aspects of being an effective information security manager
Take security policies and standards and make them work in reality
Chapter 1: Evolution of a Profession.- Chapter 2: Threats and Vulnerabilities.- Chapter 3: Introducing the Security Manager.- Chapter 4: Information Security as a Business Function.- Chapter 5: Information Security Implementation.- Chapter 6: Standards Frameworks Guidelines and Legislation.- Chapter 7: Protection of Information.- Chapter 8: Protection of People.- Chapter 9: Protection of Premises.- Chapter 10: Protection of Systems.- Chapter 11: Digital Evidence and Incident Response.- Chapter 12: Cloud Computing Security.- Chapter 13: Industrial Control Systems.- Chapter 14: Secure Systems Development.
Tony Campbell has been in the IT industry for over 25 years with the majority of his career providing consultancy services to the UK government in security architecture and security management. Prior to moving to Perth in 2013, Tony was Chief Security Architect on a large UK Ministry of Defence programme and managed a team of enterprise security architects. Since moving to Australia, he has provided strategic security consultancy to a variety of local government agencies and authored ISO27001 security manuals. Tony now works for Kinetic IT, a successful Australian owned and operated IT managed services provider where he has developed IT security strategies for both WA and Victorian clients, and is highly regarded for his insights by customers and colleagues alike. He can be contacted at: tcampbell666@gmail.com.


Il sito utilizza cookie ed altri strumenti di tracciamento che raccolgono informazioni dal dispositivo dell’utente. Oltre ai cookie tecnici ed analitici aggregati, strettamente necessari per il funzionamento di questo sito web, previo consenso dell’utente possono essere installati cookie di profilazione e marketing e cookie dei social media. Cliccando su “Accetto tutti i cookie” saranno attivate tutte le categorie di cookie. Per accettare solo deterninate categorie di cookie, cliccare invece su “Impostazioni cookie”. Chiudendo il banner o continuando a navigare saranno installati solo cookie tecnici. Per maggiori dettagli, consultare la Cookie Policy.