Download Security Program and Policies: Principles and Practices (2nd Edition) (Certification/Training) PDF EPUB
Author: Sari Greene
Pages: 648
Size: 1.219,91 Kb
Publication Date: March 29,2014
Category: Privacy & Online Safety
All you need to learn about information security applications and policies, in a single reserve
- Clearly explains all areas of InfoSec system and policy planning, advancement, deployment, and administration
- Thoroughly up-to-date for today’s challenges, laws, rules, and guidelines
- An ideal resource for anybody pursuing an information protection management profession
In today’s dangerous globe, failures in information protection can be catastrophic. Agencies must guard themselves.
Sari Stern Greene, CISSP, CRISC, CISM, NSA/IAM, can be an information protection practitioner, author, and business owner. This up-to-date guide can help you produce, deploy, and manage them.
Comprehensive and easy to comprehend, it explains key principles and methods through real-life illustrations. She actually is passionate about the need for protecting information and important infrastructure.
In the event that you understand basic info security, you’re prepared to be successful with this publication.
Learn to
· Establish program objectives, components, domains, and governance
· Understand policies, standards, methods, guidelines, and programs—and the differences included in this
· Write policies in “ordinary language,” with the proper level of fine detail
· Apply the Confidentiality, Integrity & Availability (CIA) protection model
· Make use of NIST assets and ISO/IEC 27000-series specifications
· Align protection with business technique
· Define, inventory, and classify your details and systems
· Systematically recognize, prioritize, and manage InfoSec dangers
· Reduce “people-related” dangers with role-based Protection Education, Awareness, and Schooling (SETA)
· Put into action effective physical, environmental, communications, and operational protection
· Effectively manage gain access to control
· Protected the complete system advancement lifecycle
· React to incidents and make certain continuity of functions
· Adhere to laws and regulations, which includes GLBA, HIPAA/HITECH, FISMA, state data protection and notification guidelines, and PCI DSS
She actually is actively mixed up in protection community, and speaks frequently at protection conferences and workshops..all you need to apply an effective information security program. Safety begins with comprehensive, practical policies. You’ll expert modern information security rules and frameworks, and find out particular best-practice policies for crucial industry sectors, including financing, healthcare, on the web commerce, and small company. Sari founded Sage Data Protection in 2002 and offers amassed hundreds of hours in the field dealing with a spectrum of specialized, operational, and management employees, as well as boards of directors, regulators, and providers. Her first textual content was Equipment and Approaches for Securing Microsoft Systems , commissioned by Microsoft to teach its partner channel, that was soon accompanied by the initial edition of Security Policies and Methods: Principles and Methods .. She’s been quoted in THE BRAND NEW York Occasions , Wall Road Journal , and on CNN, and CNBC. Since 2010, Sari offers served as the seat of the annual Cybercrime Symposium. You’ll discover projects, questions, exercises, illustrations, links to precious easy-to-adapt information security plans.