You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Managing information security in an uncertain world A year in the life of an information security manager. In Once more unto the Breach, Andrea C Simmons speaks directly to information security managers and provides an insider's view of the role, offering priceless gems from her extensive experience and knowledge. Based on a typical year in the life of an information security manager, the book examines how general principles can be applied to all situations and discusses lessons learned from a real project. One of the greatest challenges faced by an information security manager is convincing colleagues of the importance of following necessary processes and procedures. However, a walk through the year with Andrea will enable you to make significant inroads into improving your organization's security by learning how to: think creatively in order to provide solutions to ongoing issues create a workable information security polic
The role of the information security manager has changed. Have you? The challenges you face as an information security manager (ISM) have increased enormously since the first edition of Once more unto the breach was published. What seemed exceptional in 2011 is the norm in 2015: vulnerabilities have been experienced across all operating systems, millions of individuals have been affected by data breaches, and countless well-known companies have fallen victim to cyber attacks. It’s your duty to ensure that your organisation isn’t next. The ISM’s information security responsibilities now cover all aspects of the organisation and its operations, and relate to the security of information i...
"The purpose of this vital new report is to assist you in setting out a road map to stronger, more embedded information security that can exceed current best practice. The Public Sector Information Security report clearly highlights the areas of risk within your organisation and, in the context of the relevant security standards, examines best practice for avoiding these potential security issues."--Ark Group Australia web site.
None