Monday, July 29, 2019

Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices

File Size: 10.69 Mb

I wrote this book to help people understand the problem we are facing and to inspire hope that we can solve these problems should we choose to face these challenges head-on. It is my sincere hope that everyone reading this book will understand the global struggle that is pitting legitimate businesses around the globe against a multitude of threats that have the potential to cause significant financial damage to their organizations as well as their economies. I also endeavor to provide each reader with information that they can use inside their own organizations to build a comprehensive program to protect their information. Finally, the goal is to help security professionals and business leaders communicate better and work together on a foundation of mutual respect in order to solve complex problems together.

The process of learning all of these lessons has been one of the most rewarding experiences of my life. It has also been an amazing experience to write this book. I want to take a moment to thank you for reading and to express my hope that you find these insights as valuable as I have and you enjoy reading this book as much as I have enjoyed writing it.

About the Author
About the Technical Reviewer
Chapter 1: The Problem We Are Facing
Chapter 2: Protecting Critical Assets
Chapter 3: Monetizing Risk
Chapter 4: Security Intelligence Model
Chapter 5: Incident Response Planning
Chapter 6: The People Problem
Chapter 7: Assigning Accountability
Chapter 8: Shifting the Paradigm
Chapter 9: The Defi nition of Insanity
Chapter 10: Deja Vu
Chapter 11: The Information Security Community
Chapter 12: Partnering with Governments

Author Details
"Jeremy Wittkop"

Download Drive-1

You May Also Like These E-Books:-

No comments:

Post a Comment