Once More Unto the Breach : Mangaging Information Security in an Uncertain World.

Saved in:
Bibliographic Details
Author / Creator:Simmons, Andrea C.
Imprint:United Kingdom : IT Governance Publishing, 2015.
Description:1 online resource
Language:English
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/12871674
Hidden Bibliographic Details
ISBN:9781849287098
1849287090
9781849287081
1849287082
9781849287111
1849287112
Summary:The role of the information security manager has changed. Have you? The challenges you face as an information security manager (ISM) have increased enormously since the first edition of Once more unto the breach was published. What seemed exceptional in 2011 is the norm in 2015: vulnerabilities have been experienced across all operating systems, millions of individuals have been affected by data breaches, and countless well-known companies have fallen victim to cyber attacks. It's your duty to ensure that your organization isn't next. The ISM's information security responsibilities now cover all aspects of the organization and its operations, and relate to the security of information in all forms, locations, and transactions across the organization - and beyond. Topics covered include: Project management Physical security Password management Consumerization (BYOD) Audit log management Vulnerability management Cloud computing Incident reporting Penetration testing Linking information security with records management Privacy impact assessments Internal auditing In this revised edition of Once more unto the breach, Andrea C Simmons uses her extensive experience to provide an important insight into the changing role and responsibilities of the ISM, walking you through a typical ISM's year and highlighting the challenges and pitfalls of an information security program. One of the key failures of security change management is that it is perceived as a project instead of a program, and is therefore mistakenly assumed to have an end. Once more unto the breach explains why information security is an ongoing process, using the role of project manager on a program of change to highlight the various incidents and issues that arise on an almost daily basis - and often go unnoticed. A major challenge for the ISM is achieving all-important buy-in from their colleagues. Once more unto the breach explains how to express the importance of the tasks you are undertaking in language that executive management will understand. You'll also discover the importance of having a camera with you at all times. For too long, security has been seen as more of an inhibitor than an enabler. Once more unto the breach is an invaluable resource that will help you improve this perception, and achieve better overall information protection results as a result. About the author Andrea C Simmons is an information governance specialist with extensive experience in the private...

MARC

LEADER 00000cam a2200000Mi 4500
001 12871674
006 m o d
007 cr unu||||||||
008 180907s2015 enk o 000 0 eng d
005 20230223190558.9
020 |a 9781849287098  |q (online) 
020 |a 1849287090 
020 |a 9781849287081 
020 |a 1849287082 
020 |a 9781849287111  |q (electronic bk.) 
020 |a 1849287112  |q (electronic bk.) 
035 |a (OCoLC)1076790184 
035 9 |a (OCLCCM-CC)1076790184 
040 |a LVT  |b eng  |e pn  |c LVT  |d OCLCQ  |d N$T  |d OCLCF  |d ERF 
049 |a MAIN 
050 4 |a HF5548.37 
100 1 |a Simmons, Andrea C.  |0 http://id.loc.gov/authorities/names/nb2009023163 
245 1 0 |a Once More Unto the Breach :  |b Mangaging Information Security in an Uncertain World. 
260 |a United Kingdom :  |b IT Governance Publishing,  |c 2015. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a The role of the information security manager has changed. Have you? The challenges you face as an information security manager (ISM) have increased enormously since the first edition of Once more unto the breach was published. What seemed exceptional in 2011 is the norm in 2015: vulnerabilities have been experienced across all operating systems, millions of individuals have been affected by data breaches, and countless well-known companies have fallen victim to cyber attacks. It's your duty to ensure that your organization isn't next. The ISM's information security responsibilities now cover all aspects of the organization and its operations, and relate to the security of information in all forms, locations, and transactions across the organization - and beyond. Topics covered include: Project management Physical security Password management Consumerization (BYOD) Audit log management Vulnerability management Cloud computing Incident reporting Penetration testing Linking information security with records management Privacy impact assessments Internal auditing In this revised edition of Once more unto the breach, Andrea C Simmons uses her extensive experience to provide an important insight into the changing role and responsibilities of the ISM, walking you through a typical ISM's year and highlighting the challenges and pitfalls of an information security program. One of the key failures of security change management is that it is perceived as a project instead of a program, and is therefore mistakenly assumed to have an end. Once more unto the breach explains why information security is an ongoing process, using the role of project manager on a program of change to highlight the various incidents and issues that arise on an almost daily basis - and often go unnoticed. A major challenge for the ISM is achieving all-important buy-in from their colleagues. Once more unto the breach explains how to express the importance of the tasks you are undertaking in language that executive management will understand. You'll also discover the importance of having a camera with you at all times. For too long, security has been seen as more of an inhibitor than an enabler. Once more unto the breach is an invaluable resource that will help you improve this perception, and achieve better overall information protection results as a result. About the author Andrea C Simmons is an information governance specialist with extensive experience in the private... 
650 0 |a Business enterprises  |x Information technology  |x Security measures. 
650 0 |a Business enterprises  |x Computer networks  |x Security measures.  |0 http://id.loc.gov/authorities/subjects/sh95010367 
650 0 |a Information technology  |x Security measures. 
650 0 |a Computer security  |x Management. 
650 0 |a Computer networks  |x Security measures.  |0 http://id.loc.gov/authorities/subjects/sh94001277 
650 0 |a Data protection.  |0 http://id.loc.gov/authorities/subjects/sh85035859 
650 7 |a Business enterprises  |x Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00842535 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security  |x Management.  |2 fast  |0 (OCoLC)fst00872493 
650 7 |a Data protection.  |2 fast  |0 (OCoLC)fst00887958 
650 7 |a Information technology  |x Security measures.  |2 fast  |0 (OCoLC)fst00973129 
655 4 |a Electronic books. 
929 |a oclccm 
999 f f |s 36261a3b-bbd3-43ba-bf01-713a1edccade  |i 5162144f-13af-4d68-89f1-fae506f43b76 
928 |t Library of Congress classification  |a HF5548.37  |l Online  |c UC-FullText  |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=e000xna&AN=957893  |z eBooks on EBSCOhost  |g ebooks  |i 13009380