Takes readers through developing, distributing, and monitoring an information security awareness program. This book includes instructions on communicating the message and describes how to efficiently use outside sources to optimize the impact of a small staff.
Takes readers through developing, distributing, and monitoring an information security awareness program. This book includes instructions on communicating the message and describes how to efficiently use outside sources to optimize the impact of a small staff.
GETTING STARTED. Reviewing the Provisions the Company Now Has in Place. Learning the Players-Where the Power Resides. Learning the Corporate Culture-What Can Work Here, What Cannot. Obtaining Management Buyoff-How to Present the Case. Finding Communications Vehicles Currently in Place. ESTABLISHING A BASELINE. Review All Company Polices, Procedures, Standards, Guidelines That Even Remotely Address Information Security Issues. Identifying What Can Be Updated. Identify Documentation Needed. Prepare Documentation. Prepare Forms. Obtain Management Support for Documents-The Seal of Approval. Distribution. COMMUNICATIONS. The Media Available Through the Company. New Technology. Class or Presentation Design. Inclusion of HR Based Communications. Leveraging Resources. Locating Additional Resources. Placing Your Shots-Getting the Most Bang for Your Buck. EVALUATION. Demonstrating the Effectiveness of Your Program. Refreshing Staff Knowledge and Agreements. Use Statistics-Sparingly but Pointedly. Getting Third Party Input. Leveraging Internal Audit. Keeping Up with the Joneses-What Is Happening in the Industry.Updating the Program to Address Changing Needs.
GETTING STARTED. Reviewing the Provisions the Company Now Has in Place. Learning the Players-Where the Power Resides. Learning the Corporate Culture-What Can Work Here, What Cannot. Obtaining Management Buyoff-How to Present the Case. Finding Communications Vehicles Currently in Place. ESTABLISHING A BASELINE. Review All Company Polices, Procedures, Standards, Guidelines That Even Remotely Address Information Security Issues. Identifying What Can Be Updated. Identify Documentation Needed. Prepare Documentation. Prepare Forms. Obtain Management Support for Documents-The Seal of Approval. Distribution. COMMUNICATIONS. The Media Available Through the Company. New Technology. Class or Presentation Design. Inclusion of HR Based Communications. Leveraging Resources. Locating Additional Resources. Placing Your Shots-Getting the Most Bang for Your Buck. EVALUATION. Demonstrating the Effectiveness of Your Program. Refreshing Staff Knowledge and Agreements. Use Statistics-Sparingly but Pointedly. Getting Third Party Input. Leveraging Internal Audit. Keeping Up with the Joneses-What Is Happening in the Industry.Updating the Program to Address Changing Needs.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826