Ebook: Information security governance: a practical development and implementation approach
Author: Krag Brotby
- Series: Wiley series in systems engineering and management
- Year: 2009
- Publisher: Wiley
- Language: English
- pdf
With monotonous regularity, headlines announce ever more spectacular failures of information security and mounting losses. The succession of corporate debacles and dramatic control failures in recent years underscores the necessity for information security to be tightly integrated into the fabric of every organization. The protection of an organization's most valuable asset information can no longer be relegated to low-level technical personnel, but must be considered an essential element of corporate governance that is critical to organizational success and survival.
Written by an industry expert, Information Security Governance is the first book-length treatment of this important topic, providing readers with a step-by-step approach to developing and managing an effective information security program. Beginning with a general overview of governance, the book covers:
The business case for information security
Defining roles and responsibilities
Developing strategic metrics
Determining information security outcomes
Setting security governance objectives
Establishing risk management objectives
Developing a cost-effective security strategy
A sample strategy development
The steps for implementing an effective strategy
Developing meaningful security program development metrics
Designing relevant information security management metrics
Defining incident management and response metrics
Complemented with action plans and sample policies that demonstrate to readers how to put these ideas into practice, Information Security Governance is indispensable reading for any professional who is involved in information security and assurance.Content:
Chapter 1 Governance Overview—How Do We Do It? What Do We Get Out of It? (pages 1–8):
Chapter 2 Why Governance? (pages 9–16):
Chapter 3 Legal and Regulatory Requirements (pages 17–20):
Chapter 4 Roles and Responsibilities (pages 21–26):
Chapter 5 Strategic Metrics (pages 27–32):
Chapter 6 Information Security Outcomes (pages 33–46):
Chapter 7 Security Governance Objectives (pages 47–74):
Chapter 8 Risk Management Objectives (pages 75–79):
Chapter 9 Current State (pages 81–86):
Chapter 10 Developing a Security Strategy (pages 87–98):
Chapter 11 Sample Strategy Development (pages 99–107):
Chapter 12 Implementing Strategy (pages 109–125):
Chapter 13 Security Program Development Metrics (pages 127–129):
Chapter 14 Information Security Management Metrics (pages 131–154):
Chapter 15 Incident Management and Response Metrics (pages 155–159):
Chapter 16 Conclusion (page 161):