If you're a cybersecurity professional, then you know how it often seems that no one cares about (or understands) information security. InfoSec professionals frequently struggle to integrate security into their companies' processes. Many are at odds with their organizations. Most are under-resourced. There must be a better way. This essential manager's guide offers a new approach to building and maintaining an information security program that's both effective and easy to follow. Author and longtime chief information security officer (CISO) Todd Barnum upends the assumptions security professionals take for granted. CISOs, chief security officers, chief information officers, and IT security professionals will learn a simple seven-step process for building a new program or improving a current one. Build better relationships across the organization Align your role with your company's values, culture, and tolerance for information loss Lay the groundwork for your security program Create a communications program to share your team's contributions and educate your coworkers Transition security functions and responsibilities to other teams Organize and build an effective infosec team Measure your company's ability to recognize and report security policy violations and phishing emails
Essentials of Risk-Based Security Brian J. Allen, Esq., CISSP, CISM, CPP, CFE, Rachelle Loyear CISM, MBCP Kristen ... Additionally, books such as Enterprise Risk Assessment and Business Impact Analysis: Best Practices by Andrew Hiles ...
This book needs to be required reading before your next discussion with your corporate legal department.
This book is a great resource for information security leaders with a pragmatic approach to challenges related to real-world case scenarios.
Manager's Guide to Information Security
Implement a service management approach to implementing countermeasures. With this handbook, you can move forward confidently, trusting that Schreider is recommending the best components of a cybersecurity program for you.
In A Leader's Guide to Cybersecurity, Thomas Parenty and Jack Domet, who have spent over three decades in the field, present a timely, clear-eyed, and actionable framework that will empower senior executives and board members to become ...
"This is the book executives have been waiting for.
Integrating Cybersecurity with Business Processes: A Manager's Guide
This book is a guide to meeting those challenges, providing the security manager with the essential skill set and knowledge base to meet the challenges faced in contemporary, international, or tech-oriented businesses.
Written by a practicing information security officer, Philip Alexander, the book contains the latest information and arms readers with the knowledge they need to make better business decisions.