Skip to Content
Information Security A Practical Guide: Bridging the Gap between IT and Management
book

Information Security A Practical Guide: Bridging the Gap between IT and Management

by Tom Mooney
June 2015
Beginner to intermediate
116 pages
2h 9m
English
IT Governance Publishing

Overview

Information Security A Practical Guide - Bridging the gap between IT and management

“One of the most impressive…..This book is well worth an hour of your time, whether as a refresher, or if you are finding yourself facing more work on the info-security side. Recommended.”

Mark Rowe, Editor at Professional Security Magazine

Corporate information security is often hindered by a lack of adequate communication between the security team and the rest of the organization . Information security affects the whole company and is a responsibility shared by all staff, so failing to obtain wider acceptance can endanger the security of the entire organization . Many consider information security a block, not a benefit, however, and view security professionals with suspicion if not outright hostility. As a security professional, how can you get broader buy-in from your colleagues?

Information Security: A Practical Guide addresses that issue by providing an overview of basic information security practices that will enable your security team to better engage with their peers to address the threats facing the organization as a whole.

Product overview

Covering everything from your first day at work as an information security professional to developing and implementing enterprise-wide information security processes, Information Security: A Practical Guide explains the basics of information security, and how to explain them to management and others so that security risks can be appropriately addressed.

Topics covered include:

How to understand the security culture of the organization
Getting to know the organization and building relationships with key personnel
How to identify gaps in the organization’s security set-up
The impact of compromise on the organization
Identifying, categorising and prioritising risks
The five levels of risk appetite and how to apply risk treatments via security controls
Understanding the threats facing your organization and how to communicate them
How to raise security awareness and engage with specific peer groups
System mapping and documentation (including control boundaries and where risks exist)
The importance of conducting regular penetration testing and what to do with the results
Information security policies and processes
A standards-based approach to information security
If you’re starting a new job as an information security professional, Information Security: A Practical Guide contains all you need to know.

About the author

Tom Mooney has over ten years’ IT experience working with sensitive information. His current role is as a security risk advisor for the UK Government, where he works with project teams and the wider organisation to deliver key business systems securely. His key responsibility is to act as an intermediary between management and IT teams to ensure appropriate security controls are put in place. His extensive experience has led him to develop many skills and techniques to converse with people who are not technical or information security experts. Many of these skills and techniques are found in this book.

He has a BSc (Hons) in information and computer security, and is also a CESG certified professional.

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.

Read now

Unlock full access

More than 5,000 organizations count on O’Reilly

AirBnbBlueOriginElectronic ArtsHomeDepotNasdaqRakutenTata Consultancy Services

QuotationMarkO’Reilly covers everything we've got, with content to help us build a world-class technology community, upgrade the capabilities and competencies of our teams, and improve overall team performance as well as their engagement.
Julian F.
Head of Cybersecurity
QuotationMarkI wanted to learn C and C++, but it didn't click for me until I picked up an O'Reilly book. When I went on the O’Reilly platform, I was astonished to find all the books there, plus live events and sandboxes so you could play around with the technology.
Addison B.
Field Engineer
QuotationMarkI’ve been on the O’Reilly platform for more than eight years. I use a couple of learning platforms, but I'm on O'Reilly more than anybody else. When you're there, you start learning. I'm never disappointed.
Amir M.
Data Platform Tech Lead
QuotationMarkI'm always learning. So when I got on to O'Reilly, I was like a kid in a candy store. There are playlists. There are answers. There's on-demand training. It's worth its weight in gold, in terms of what it allows me to do.
Mark W.
Embedded Software Engineer

You might also like

Managing Risk and Information Security: Protect to Enable, Second Edition

Managing Risk and Information Security: Protect to Enable, Second Edition

Malcolm W. Harkins
Auditing IT Infrastructures for Compliance, 3rd Edition

Auditing IT Infrastructures for Compliance, 3rd Edition

Robert Johnson, Marty Weiss, Michael G. Solomon

Publisher Resources

ISBN: 9781849287418