CDN$ 84.76
  • List Price: CDN$ 105.95
  • You Save: CDN$ 21.19 (20%)
Only 1 left in stock (more on the way).
Ships from and sold by Amazon.ca.
Gift-wrap available.
Quantity:1
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Information Security Governance: A Practical Development and Implementation Approach Hardcover – Apr 13 2009


See all formats and editions Hide other formats and editions
Amazon Price New from Used from
Hardcover
"Please retry"
CDN$ 84.76
CDN$ 79.62 CDN$ 117.18

2014 Books Gift Guide
Yes Please, the eagerly anticipated first book from Amy Poehler, the Golden Globe winning star of Parks and Recreation, is featured in our 2014 Books Gift Guide. More gift ideas

Customers Who Bought This Item Also Bought



Product Details

  • Hardcover: 220 pages
  • Publisher: Wiley (April 13 2009)
  • Language: English
  • ISBN-10: 0470131187
  • ISBN-13: 978-0470131183
  • Product Dimensions: 16.3 x 1.8 x 24.6 cm
  • Shipping Weight: 408 g
  • Average Customer Review: 5.0 out of 5 stars  See all reviews (1 customer review)
  • Amazon Bestsellers Rank: #149,806 in Books (See Top 100 in Books)
  • See Complete Table of Contents

Product Description

From the Back Cover

The Growing Imperative Need for Effective Information Security Governance

With monotonous regularity, headlines announce ever more spectacular failures of information security and mounting losses. The succession of corporate debacles and dramatic control failures in recent years underscores the necessity for information security to be tightly integrated into the fabric of every organization. The protection of an organization's most valuable asset information can no longer be relegated to low-level technical personnel, but must be considered an essential element of corporate governance that is critical to organizational success and survival.

Written by an industry expert, Information Security Governance is the first book-length treatment of this important topic, providing readers with a step-by-step approach to developing and managing an effective information security program. Beginning with a general overview of governance, the book covers:

  • The business case for information security

  • Defining roles and responsibilities

  • Developing strategic metrics

  • Determining information security outcomes

  • Setting security governance objectives

  • Establishing risk management objectives

  • Developing a cost-effective security strategy

  • A sample strategy development

  • The steps for implementing an effective strategy

  • Developing meaningful security program development metrics

  • Designing relevant information security management metrics

  • Defining incident management and response metrics

  • Complemented with action plans and sample policies that demonstrate to readers how to put these ideas into practice, Information Security Governance is indispensable reading for any professional who is involved in information security and assurance.

About the Author

Krag Brotby, cism, has more than twenty-five years of experience in the computer security field with a focus on governance, metrics, and architecture. A frequent presenter at security conferences, he has authored a variety of publications on information security risk management, governance, and metrics. A principal author and editor of the ISACA CISM review manual and related presentation materials, he has served on the CISM Practice Analysis Task Force defining the information security practice area for the coming years.


Inside This Book (Learn More)
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index | Back Cover
Search inside this book:

Customer Reviews

5.0 out of 5 stars
5 star
1
4 star
0
3 star
0
2 star
0
1 star
0
See the customer review
Share your thoughts with other customers

Most helpful customer reviews

Format: Hardcover Verified Purchase
Good
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again.

Most Helpful Customer Reviews on Amazon.com (beta)

Amazon.com: 4 reviews
2 of 2 people found the following review helpful
The kind of book that grows on you Jan. 20 2011
By Dr. G. Hinson - Published on Amazon.com
Format: Hardcover Verified Purchase
While inevitably introducing related aspects such as general/corporate governance and management, information, risk and information security management, and IT security operations, the book's prime focus is firmly on the governance of information security. A rational process for determining the strategy and defining desirable outcomes and strategic objectives for information security runs like a center-line from start to finish.

This is an advanced management topic of direct concern to senior information security, risk management and related assurance professionals. Although unfortunately only CISOs or CIOs may be prepared to set aside the time needed to really study a book of this depth, it is equally valuable for all C-suite executive managers and board members with a genuine interest in aligning information security with other business objectives.

As with Krag's complementary book on security metrics (Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement), the depth of coverage is a little inconsistent with a couple of the chapters, including the conclusion, being surprisingly short. Chapter three on legal and regulatory requirements, for instance, is just over three pages long although compliance is undoubtedly an important governance issue and, unfortunately, a major strategic driver in this field. To be fair, most of the laws, regulations and standards are self-explanatory and there are hundreds, maybe thousands of them across the globe so there would be little point in going through them in detail here.

Information Security Governance confidently covers challenging material on a subject that many find hard to even describe, let alone understand. The effort needed to read and learn from this book pays off through a better appreciation of both the theoretical background and the practical steps needed to design, develop, implement and manage - or govern - information security at the strategic level.
Excellent content, over priced. June 29 2014
By James C. Rice - Published on Amazon.com
Format: Hardcover Verified Purchase
The content of this book is very good and its nice to bring it all into one place. But, its a very expensive book for material that can be located in so many other places. I was hoping for a little more practice experience by the author based on the person I received the recommendation from.
Five Stars Nov. 4 2014
By mcapont - Published on Amazon.com
Format: Hardcover Verified Purchase
Great! Thanks!
0 of 1 people found the following review helpful
Five Stars July 16 2014
By Joy Wesley - Published on Amazon.com
Format: Hardcover Verified Purchase
Excellent!


Feedback