Todd Fitzgerald (LLC CISO SPOTLIGHT)
Information Security Governance Simplified
From the Boardroom to the Keyboard
Todd Fitzgerald (LLC CISO SPOTLIGHT)
Information Security Governance Simplified
From the Boardroom to the Keyboard
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Security practitioners must be able to build a cost-effective security program while at the same time meet the requirements of government regulations. This book lays out these regulations in simple terms and explains how to use the control frameworks to build an effective information security program and governance structure. It discusses how or
Andere Kunden interessierten sich auch für
- Brotby, W. Krag, CISMInformation Security Management Metrics103,99 €
- Tyler Justin SpeedAsset Protection through Security Awareness76,99 €
- Yassine MalehIT Governance and Information Security65,99 €
- Angel R. OteroInformation Technology Control and Audit, Fifth Edition67,99 €
- Jeff StapletonSecurity without Obscurity52,99 €
- Jeffrey W. BrownThe Security Leader's Communication Playbook66,99 €
- Felicia NicastroSecurity Patch Management81,99 €
-
-
-
Security practitioners must be able to build a cost-effective security program while at the same time meet the requirements of government regulations. This book lays out these regulations in simple terms and explains how to use the control frameworks to build an effective information security program and governance structure. It discusses how or
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 431
- Erscheinungstermin: 30. September 2020
- Englisch
- Abmessung: 156mm x 233mm x 35mm
- Gewicht: 660g
- ISBN-13: 9780367659226
- ISBN-10: 0367659220
- Artikelnr.: 59983076
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 431
- Erscheinungstermin: 30. September 2020
- Englisch
- Abmessung: 156mm x 233mm x 35mm
- Gewicht: 660g
- ISBN-13: 9780367659226
- ISBN-10: 0367659220
- Artikelnr.: 59983076
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
Todd Fitzgerald, CISSP, CISA, CISM, CIPM, CIPP/US, CIPP/E, CIPP/C, CGEIT, CRISC, PMP, ISO27000, and ITILv3 certified, is Managing Director and CISO of CISO Spotlight, LLC. Todd has built and led multiple Fortune 500/large company information security programs for 20 years across multiple industries, named 2016-17 Chicago CISO of the Year by AITP, ISSA, ISACA, Infragard and SIM, ranked Top 50 Information Security Executive, and Information Security Executive (ISE) Award Finalist, and named Ponemon Institute Fellow. Fitzgerald coauthored with Micki Krause the first professional organization Chief Information Security Officer book, CISO Leadership: Essential Principles for Success (Auerbach, 2008). Todd also authored Information Security Governance Simplified: From the Boardroom to the Keyboard (Auerbach, 2012), and co-authored Certified Chief Information Security Officer Body of Knowledge (E-C Council, 2014), and has contributed to over a dozen others. Fitzgerald has participated in the development of materials for the Official (ISC)2 Guide to the CISSP CBK, Information Security Handbook Series, ISACA COBIT 5 for Information Security, and ISACA CSX Cybersecurity Fundamentals. Fitzgerald is a top-rated RSA Conference speaker and is frequently called upon to present at international, national and local conferences for Information Systems Audit and Control Association (ISACA), Information Systems security Association (ISSA), Management Information Systems Training Institute (MISTI), COSAC, Centers for Medicare and Medicaid Services, T.E.N., and others. Fitzgerald serves on the HIPAA Collaborative of Wisconsin Board of Directors (2002-present), Milwaukee Area Technical College Security Advisory Board, and University of Wisconsin-La Crosse College of Business Administration Board of Advisors. Prior senior leadership includes SVP, CAO Information Security Northern Trust, Global CISO Grant Thornton International, Ltd, Global CISO ManpowerGroup, Medicare Security Officer/External Audit Oversight WellPoint (now Anthem) Blue Cross Blue Shield-National Government Services, CISO North & Latin America Zeneca/Syngenta and senior Information Technology leadership positions with IMS Health, and American Airlines. Todd earned a B.S. in Business Administration from the University of Wisconsin-La Crosse and Master Business Administration with highest honors from Oklahoma State University.
Getting Information Security Right - Top to Bottom. Developing Information
Strategy. Defining the Security Management Organization. Interacting with
the C-Suite. Managing Risk to an Acceptable Level. Creating Effective
Information Security Policies. Security Compliance Using Control
Frameworks. Managerial Controls - Practical Security Considerations.
Technical Controls - Practical Security Considerations. Operational
Controls - Practical Security Considerations. The Auditors Have Arrived -
Now What? Effective Security Communications. The Law and Information
Security. Learning From Information Security Incidents. 17 Ways to
Dismantle Information Security Efforts.
Strategy. Defining the Security Management Organization. Interacting with
the C-Suite. Managing Risk to an Acceptable Level. Creating Effective
Information Security Policies. Security Compliance Using Control
Frameworks. Managerial Controls - Practical Security Considerations.
Technical Controls - Practical Security Considerations. Operational
Controls - Practical Security Considerations. The Auditors Have Arrived -
Now What? Effective Security Communications. The Law and Information
Security. Learning From Information Security Incidents. 17 Ways to
Dismantle Information Security Efforts.
Getting Information Security Right - Top to Bottom. Developing Information
Strategy. Defining the Security Management Organization. Interacting with
the C-Suite. Managing Risk to an Acceptable Level. Creating Effective
Information Security Policies. Security Compliance Using Control
Frameworks. Managerial Controls - Practical Security Considerations.
Technical Controls - Practical Security Considerations. Operational
Controls - Practical Security Considerations. The Auditors Have Arrived -
Now What? Effective Security Communications. The Law and Information
Security. Learning From Information Security Incidents. 17 Ways to
Dismantle Information Security Efforts.
Strategy. Defining the Security Management Organization. Interacting with
the C-Suite. Managing Risk to an Acceptable Level. Creating Effective
Information Security Policies. Security Compliance Using Control
Frameworks. Managerial Controls - Practical Security Considerations.
Technical Controls - Practical Security Considerations. Operational
Controls - Practical Security Considerations. The Auditors Have Arrived -
Now What? Effective Security Communications. The Law and Information
Security. Learning From Information Security Incidents. 17 Ways to
Dismantle Information Security Efforts.