Book reviews
 
Information Protection Playbook   

Information Protection Playbook


Greg Kane Lorna Koppel

eBook. Elsevier Science 2013-09-17.
ISBN 9780124172425
Buy from Amazon.com







Publisher description

The primary goal of the Information Protection Playbook is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that protects the applications, systems, and networks that deliver business information from failures of confidentiality, integrity, availability, trust and accountability, and privacy. Using the guidelines provided in the Information Protection Playbook, security and information technology (IT) managers will learn how to implement the five functions of an IP framework: governance, program planning, risk management, incident response management, and program administration. These functions are based on a model promoted by the Information Systems Audit and Control Association (ISACA) and validated by thousands of Certified Information Security Managers. The five functions are further broken down into a series of objectives or milestones to be achieved in order to implement an IP framework. The extensive appendices included at the end of the book make for an excellent resource for the security or IT manager building an IP program from the ground up. They include, for example, a board of directors presentation complete with sample slides; an IP policy document checklist; a risk prioritization procedure matrix, which illustrates how to classify a threat based on a scale of high, medium, and low; a facility management self-assessment questionnaire; and a list of representative job descriptions for roles in IP. The Information Protection Playbook is a part of Elsevier's Security Executive Council Risk Management Portfolio, a collection of real world solutions and &quote;how-to&quote; guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.Emphasizes information protection guidelines that are driven by business objectives, laws, regulations, and industry standardsDraws from successful practices in global organizations, benchmarking, advice from a variety of subject-matter experts, and feedback from the organizations involved with the Security Executive CouncilIncludes 11 appendices full of the sample checklists, matrices, and forms that are discussed in the book



More books by the authors

Similar books

Rate the book

Write a review and share your opinion with others. Try to focus on the content of the book. Read our instructions for further information.

Information Protection Playbook



Your rating:  1 2 3 4 5

Please enter a title for your review (min 2 words):



Type your review in the space below (max 1000 words):



Language of the review: 

Your name (optional):



Your email address (not displayed, only for verification):







Information Protection Playbook Your review will be displayed within five to seven business days.

Information Protection Playbook Reviews that doesn't follow our instructions will not be displayed.







Book reviews » Information Protection Playbook
Information Protection Playbook
Information Protection Playbook
  
Categories

Arts & Photography

Biographies & Memoirs

Business & Investing

Children's Books

Comics & Graphic Novels

Computers & Internet

Cooking, Food & Wine

Entertainment

Health, Mind & Body

History

Home & Garden

Horror

Law

Literature & Fiction

Medicine

Mystery & Thrillers

Nonfiction

Outdoors & Nature

Parenting & Families

Professional & Technical

Reference

Religion & Spirituality

Romance

Science

Science Fiction & Fantasy

Sports





Book reviews | Help & support | About us


Bokrecensioner Boganmeldelser Bokanmeldelser Kirja-arvostelut Critiques de Livres Buchrezensionen Critica Literaria Book reviews Book reviews Recensioni di Libri Boekrecensies Critica de Libros
Book reviews