
xi
Introduction
From the earliest editions of the Handbook, we recognized a growing need for professionals who
are qualified to meet the challenges of complex technologies and escalating threats to information
security.
However, as risks mount and information technology becomes that much more complicated,
certified information security professionals must increasingly partner with skilled staff from sister
disciplines such as risk management, business continuity, and law.
Today, maintaining information technology security, as well as keeping pace with competing
standards, onerous regulations, and competitive markets, requires a village—a well-tra