Vous voulez voir cette page en français ? Cliquez ici.


or
Sign in to turn on 1-Click ordering.
or
Amazon Prime Free Trial required. Sign up when you check out. Learn More
More Buying Choices
Have one to sell? Sell yours here
Tell the Publisher!
I'd like to read this book on Kindle

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

Information Security Governance: A Practical Development and Implementation Approach [Hardcover]

Krag Brotby

List Price: CDN$ 105.95
Price: CDN$ 84.76 & FREE Shipping. Details
You Save: CDN$ 21.19 (20%)
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Only 2 left in stock (more on the way).
Ships from and sold by Amazon.ca. Gift-wrap available.
Want it delivered Tuesday, October 21? Choose One-Day Shipping at checkout.
Join Amazon Student in Canada


Book Description

April 13 2009 0470131187 978-0470131183
The Growing Imperative Need for Effective Information Security Governance

With monotonous regularity, headlines announce ever more spectacular failures of information security and mounting losses. The succession of corporate debacles and dramatic control failures in recent years underscores the necessity for information security to be tightly integrated into the fabric of every organization. The protection of an organization's most valuable asset information can no longer be relegated to low-level technical personnel, but must be considered an essential element of corporate governance that is critical to organizational success and survival.

Written by an industry expert, Information Security Governance is the first book-length treatment of this important topic, providing readers with a step-by-step approach to developing and managing an effective information security program. Beginning with a general overview of governance, the book covers:

  • The business case for information security

  • Defining roles and responsibilities

  • Developing strategic metrics

  • Determining information security outcomes

  • Setting security governance objectives

  • Establishing risk management objectives

  • Developing a cost-effective security strategy

  • A sample strategy development

  • The steps for implementing an effective strategy

  • Developing meaningful security program development metrics

  • Designing relevant information security management metrics

  • Defining incident management and response metrics

Complemented with action plans and sample policies that demonstrate to readers how to put these ideas into practice, Information Security Governance is indispensable reading for any professional who is involved in information security and assurance.


Customers Who Bought This Item Also Bought


Product Details


Product Description

From the Back Cover

The Growing Imperative Need for Effective Information Security Governance

With monotonous regularity, headlines announce ever more spectacular failures of information security and mounting losses. The succession of corporate debacles and dramatic control failures in recent years underscores the necessity for information security to be tightly integrated into the fabric of every organization. The protection of an organization's most valuable asset information can no longer be relegated to low-level technical personnel, but must be considered an essential element of corporate governance that is critical to organizational success and survival.

Written by an industry expert, Information Security Governance is the first book-length treatment of this important topic, providing readers with a step-by-step approach to developing and managing an effective information security program. Beginning with a general overview of governance, the book covers:

  • The business case for information security

  • Defining roles and responsibilities

  • Developing strategic metrics

  • Determining information security outcomes

  • Setting security governance objectives

  • Establishing risk management objectives

  • Developing a cost-effective security strategy

  • A sample strategy development

  • The steps for implementing an effective strategy

  • Developing meaningful security program development metrics

  • Designing relevant information security management metrics

  • Defining incident management and response metrics

  • Complemented with action plans and sample policies that demonstrate to readers how to put these ideas into practice, Information Security Governance is indispensable reading for any professional who is involved in information security and assurance.

About the Author

Krag Brotby, cism, has more than twenty-five years of experience in the computer security field with a focus on governance, metrics, and architecture. A frequent presenter at security conferences, he has authored a variety of publications on information security risk management, governance, and metrics. A principal author and editor of the ISACA CISM review manual and related presentation materials, he has served on the CISM Practice Analysis Task Force defining the information security practice area for the coming years.


Inside This Book (Learn More)
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index | Back Cover
Search inside this book:

Sell a Digital Version of This Book in the Kindle Store

If you are a publisher or author and hold the digital rights to a book, you can sell a digital version of it in our Kindle Store. Learn more

Customer Reviews

There are no customer reviews yet on Amazon.ca
5 star
4 star
3 star
2 star
1 star
Most Helpful Customer Reviews on Amazon.com (beta)
Amazon.com: 4.3 out of 5 stars  3 reviews
2 of 2 people found the following review helpful
5.0 out of 5 stars The kind of book that grows on you Jan. 20 2011
By Dr. G. Hinson - Published on Amazon.com
Format:Hardcover|Verified Purchase
While inevitably introducing related aspects such as general/corporate governance and management, information, risk and information security management, and IT security operations, the book's prime focus is firmly on the governance of information security. A rational process for determining the strategy and defining desirable outcomes and strategic objectives for information security runs like a center-line from start to finish.

This is an advanced management topic of direct concern to senior information security, risk management and related assurance professionals. Although unfortunately only CISOs or CIOs may be prepared to set aside the time needed to really study a book of this depth, it is equally valuable for all C-suite executive managers and board members with a genuine interest in aligning information security with other business objectives.

As with Krag's complementary book on security metrics (Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement), the depth of coverage is a little inconsistent with a couple of the chapters, including the conclusion, being surprisingly short. Chapter three on legal and regulatory requirements, for instance, is just over three pages long although compliance is undoubtedly an important governance issue and, unfortunately, a major strategic driver in this field. To be fair, most of the laws, regulations and standards are self-explanatory and there are hundreds, maybe thousands of them across the globe so there would be little point in going through them in detail here.

Information Security Governance confidently covers challenging material on a subject that many find hard to even describe, let alone understand. The effort needed to read and learn from this book pays off through a better appreciation of both the theoretical background and the practical steps needed to design, develop, implement and manage - or govern - information security at the strategic level.
3.0 out of 5 stars Excellent content, over priced. June 29 2014
By James C. Rice - Published on Amazon.com
Format:Hardcover|Verified Purchase
The content of this book is very good and its nice to bring it all into one place. But, its a very expensive book for material that can be located in so many other places. I was hoping for a little more practice experience by the author based on the person I received the recommendation from.
0 of 1 people found the following review helpful
5.0 out of 5 stars Five Stars July 16 2014
By Joy Wesley - Published on Amazon.com
Format:Hardcover|Verified Purchase
Excellent!

Look for similar items by category


Feedback