Information Protection Playbook

Information Protection Playbook
Author :
Publisher : Elsevier
Total Pages : 129
Release :
ISBN-10 : 9780124172425
ISBN-13 : 0124172423
Rating : 4/5 (423 Downloads)

Book Synopsis Information Protection Playbook by : Greg Kane

Download or read book Information Protection Playbook written by Greg Kane and published by Elsevier. This book was released on 2013-09-17 with total page 129 pages. Available in PDF, EPUB and Kindle. Book excerpt: The primary goal of the Information Protection Playbook is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that protects the applications, systems, and networks that deliver business information from failures of confidentiality, integrity, availability, trust and accountability, and privacy. Using the guidelines provided in the Information Protection Playbook, security and information technology (IT) managers will learn how to implement the five functions of an IP framework: governance, program planning, risk management, incident response management, and program administration. These functions are based on a model promoted by the Information Systems Audit and Control Association (ISACA) and validated by thousands of Certified Information Security Managers. The five functions are further broken down into a series of objectives or milestones to be achieved in order to implement an IP framework. The extensive appendices included at the end of the book make for an excellent resource for the security or IT manager building an IP program from the ground up. They include, for example, a board of directors presentation complete with sample slides; an IP policy document checklist; a risk prioritization procedure matrix, which illustrates how to classify a threat based on a scale of high, medium, and low; a facility management self-assessment questionnaire; and a list of representative job descriptions for roles in IP. The Information Protection Playbook is a part of Elsevier's Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs. - Emphasizes information protection guidelines that are driven by business objectives, laws, regulations, and industry standards - Draws from successful practices in global organizations, benchmarking, advice from a variety of subject-matter experts, and feedback from the organizations involved with the Security Executive Council - Includes 11 appendices full of the sample checklists, matrices, and forms that are discussed in the book


Information Protection Playbook Related Books

Information Protection Playbook
Language: en
Pages: 129
Authors: Greg Kane
Categories: Computers
Type: BOOK - Published: 2013-09-17 - Publisher: Elsevier

GET EBOOK

The primary goal of the Information Protection Playbook is to serve as a comprehensive resource for information protection (IP) professionals who must provide a
Crafting the InfoSec Playbook
Language: en
Pages: 241
Authors: Jeff Bollinger
Categories: Computers
Type: BOOK - Published: 2015-05-07 - Publisher: "O'Reilly Media, Inc."

GET EBOOK

Any good attacker will tell you that expensive security monitoring and prevention tools aren’t enough to keep you secure. This practical book demonstrates a d
The Cybersecurity Playbook
Language: en
Pages: 230
Authors: Allison Cerra
Categories: Business & Economics
Type: BOOK - Published: 2019-09-11 - Publisher: John Wiley & Sons

GET EBOOK

The real-world guide to defeating hackers and keeping your business secure Many books discuss the technical underpinnings and complex configurations necessary f
Ransomware Protection Playbook
Language: en
Pages: 204
Authors: Roger A. Grimes
Categories: Computers
Type: BOOK - Published: 2021-09-14 - Publisher: John Wiley & Sons

GET EBOOK

Avoid becoming the next ransomware victim by taking practical steps today Colonial Pipeline. CWT Global. Brenntag. Travelex. The list of ransomware victims is l
Physical Security Strategy and Process Playbook
Language: en
Pages: 158
Authors: John Kingsley-Hefty
Categories: Social Science
Type: BOOK - Published: 2013-09-25 - Publisher: Elsevier

GET EBOOK

The Physical Security Strategy and Process Playbook is a concise yet comprehensive treatment of physical security management in the business context. It can be