The CISO handbook : a practical guide to securing your company /: a practical guide to securing your company. (2006)
- Record Type:
- Book
- Title:
- The CISO handbook : a practical guide to securing your company /: a practical guide to securing your company. (2006)
- Main Title:
- The CISO handbook : a practical guide to securing your company
- Further Information:
- Note: Michael Gentile, Ronald D. Collette, Thomas D. August.
- Other Names:
- Gentile, Michael
Collette, Ronald D
August, Thomas D - Contents:
- Assess ; Overview; Foundation Concepts; Critical Skills; Consultative Sales Skills; Critical Knowledge; Understanding Your Business; Understanding Risk; Understanding Your Enterprise Differentiators ; Understanding Your Legal and Regulatory Environment ; Understanding Your Organizational Structure ; Understanding Your Organizational Dynamics ; Enterprise Culture ; Understanding your Enterprise’s View of Technology ; Assessment Methodology ; Identifying your Program’s Primary Driver; Why Are You Here? ; Stakeholders ; Identifying your External Drivers ; Other External Drivers ; Identifying your Internal Drivers ; Assessment Checklist ; Plan ; Overview ; Foundation Concepts ; Critical Skills ; Visioning ; Strategic Planning ; Negotiating ; Marketing ; Talent Assessment ; Critical Skills Summary ; Critical Knowledge ; ISC2 Common Body of Knowledge [CBK] ; Other Security Industry Resources ; Planning Methodology ; Understanding your Program’s Mandate ; Determining Your Program’s Structure ; Centralized vs. Decentralized ; Security Pipeline ; Size of Your Program ; Security Program Structure Summary ; Determining Your Program’s Staffing ; Planning Summary ; Planning Checklist ; ; Design ; Overview ; Foundation Concepts ; Critical Skills ; Critical Knowledge ; Methodology ; Preview; Security Document Development; Project Portfolio Development ; Communication Plan Development ; Incorporating your Enterprise Drivers ; Requirements ; Gap Analysis ; Building Security Policies,Assess ; Overview; Foundation Concepts; Critical Skills; Consultative Sales Skills; Critical Knowledge; Understanding Your Business; Understanding Risk; Understanding Your Enterprise Differentiators ; Understanding Your Legal and Regulatory Environment ; Understanding Your Organizational Structure ; Understanding Your Organizational Dynamics ; Enterprise Culture ; Understanding your Enterprise’s View of Technology ; Assessment Methodology ; Identifying your Program’s Primary Driver; Why Are You Here? ; Stakeholders ; Identifying your External Drivers ; Other External Drivers ; Identifying your Internal Drivers ; Assessment Checklist ; Plan ; Overview ; Foundation Concepts ; Critical Skills ; Visioning ; Strategic Planning ; Negotiating ; Marketing ; Talent Assessment ; Critical Skills Summary ; Critical Knowledge ; ISC2 Common Body of Knowledge [CBK] ; Other Security Industry Resources ; Planning Methodology ; Understanding your Program’s Mandate ; Determining Your Program’s Structure ; Centralized vs. Decentralized ; Security Pipeline ; Size of Your Program ; Security Program Structure Summary ; Determining Your Program’s Staffing ; Planning Summary ; Planning Checklist ; ; Design ; Overview ; Foundation Concepts ; Critical Skills ; Critical Knowledge ; Methodology ; Preview; Security Document Development; Project Portfolio Development ; Communication Plan Development ; Incorporating your Enterprise Drivers ; Requirements ; Gap Analysis ; Building Security Policies, Standards, Procedures, And Guidelines ; Build Security Documents Summary ; Building the Security Project Portfolio ; Annual Portfolio Review ; Build the Communication Plan ; Chapter Summary ; Design Checklist ; Execute ; Overview ; Foundation Concepts ; Preview; Critical Skills ; Critical Knowledge ; Methodology ; Project Execution ; Administrative Cleanup ; Chapter Summary ; Report ; Overview ; Foundation Concepts ; Critical Skills ; Critical Knowledge ; Marketing ; Methodology ; Report Construction Process ; Determine Target Audience ; Delivery Mechanisms ; Chapter Summary ; ; The Final Phase ; Overview ; Back To the Beginning ; Parting Thoughts ; ; Appendix A Design Chapter Worksheets ; Appendix B Report Creation Process Worksheet ; Appendix C Requirements Sample ; Appendix D SDLC Checklist ; Appendix E Recommended Reading … (more)
- Publisher Details:
- Boca Raton : Auerbach Publications
- Publication Date:
- 2006
- Extent:
- 1 online resource (xxiii, 322 pages), illustrations
- Subjects:
- 658.4/78
Electronic data processing departments -- Security measures
Computer security
Data protection
BUSINESS & ECONOMICS -- Workplace Culture
BUSINESS & ECONOMICS -- Corporate Governance
BUSINESS & ECONOMICS -- Leadership
BUSINESS & ECONOMICS -- Organizational Development
Computer security
Data protection
Electronic data processing departments -- Security measures
Electronic books - Languages:
- English
- ISBNs:
- 0203493737
9780203493731
1420031376
9781420031379
0849319528
9780849319525 - Notes:
- Note: Includes bibliographical references (pages 313-314) and index.
Note: Print version record. - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.154452
- Ingest File:
- 01_095.xml