You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
For many companies, their intellectual property can often be more valuable than their physical assets. Having an effective IT governance strategy in place can protect this intellectual property, reducing the risk of theft and infringement. Data protection, privacy and breach regulations, computer misuse around investigatory powers are part of a complex and often competing range of requirements to which directors must respond. There is increasingly the need for an overarching information security framework that can provide context and coherence to compliance activity worldwide. IT Governance is a key resource for forward-thinking managers and executives at all levels, enabling them to underst...
Studies have shown that a company's share price is often linked to how well governed the company is, providing board members with a strong financial incentive to maintain good corporate governance practices. Yet what may constitute good governance will vary across different countries and companies, and there is no 'one size fits all' model of corporate governance. Corporate Governance will help you to become familiar with the principles and practice of good governance appropriate to your company, enabling you to uphold those standards that will improve your corporate reputation while providing reassurance to market regulators. For directors of companies of all shapes and sizes, this is essential reading, and will answer all your questions on what good corporate governance means for you, your company's reputation and its share price.
This pocket guide provides an introduction on how to approach the complex subject of IT governance. It describes the drivers for IT governance: why it matters, and the relationships between IT governance, risk management, information risk, project governance and compliance risk.
Drawing on international best practice, including ISO/IEC 27005, NIST SP800-30 and BS7799-3, the book explains in practical detail how to carry out an information security risk assessment. It covers key topics, such as risk scales, threats and vulnerabilities, selection of controls, and roles and responsibilities, and includes advice on choosing risk assessment software.
The perfect introduction to the principles of data privacy and the General European Union Data Protection Regulation, this guide is the ideal resource for anyone wanting a clear, concise primer on data protection.
An experimentalist novel which captures the `collective unconscious' of the twentieth century in a language that can have few rivals for economy, beauty and rhythm.
This new book sets out for managers, executives and IT professionals the practical steps necessary to meet today's corporate and IT governance requirements. It provides practical guidance on how board executives and IT professionals can navigate, integrate and deploy to best corporate and commercial advantage the most widely used frameworks and standards.
Ideal for risk managers, information security managers, lead implementers, compliance managers and consultants, as well as providing useful background material for auditors, this book will enable readers to develop an ISO 27001-compliant risk assessment framework for their organisation and deliver real, bottom-line business benefits.
This pocket guide serves as an introduction to the National Institute of Standards and Technology (NIST) and to its Cybersecurity Framework (CSF). This is a US focused product. Now more than ever, organizations need to have a strong and flexible cybersecurity strategy in place in order to both protect themselves and be able to continue business in the event of a successful attack. The NIST CSF is a framework for organizations to manage and mitigate cybersecurity risk based on existing standards, guidelines, and practices. With this pocket guide you can: Adapt the CSF for organizations of any size to implementEstablish an entirely new cybersecurity program, improve an existing one, or simply ...
ISO 22301:2019 and business continuity management – Understand how to plan, implement and enhance a business continuity management system (BCMS) walks you through the requirements of ISO 22301, explaining what they mean and how your organisation can achieve compliance. It is an essential companion guide for those working in business continuity.