Book description
The role of the information security manager has changed. Have you?
The challenges you face as an information security manager (ISM) have increased enormously since the first edition of Once more unto the breach was published.
What seemed exceptional in 2011 is the norm in 2015: vulnerabilities have been experienced across all operating systems, millions of individuals have been affected by data breaches, and countless well-known companies have fallen victim to cyber attacks.
It’s your duty to ensure that your organization isn’t next.
The ISM’s information security responsibilities now cover all aspects of the organization and its operations, and relate to the security of information in all forms, locations, and transactions across the organization – and beyond.
Topics covered include:
Project management
Physical security
Password management
Consumerization (BYOD)
Audit log management
Vulnerability management
Cloud computing
Incident reporting
Penetration testing
Linking information security with records management
Privacy impact assessments
Internal auditing
In this revised edition of Once more unto the breach, Andrea C Simmons uses her extensive experience to provide an important insight into the changing role and responsibilities of the ISM, walking you through a typical ISM’s year and highlighting the challenges and pitfalls of an information security program.
One of the key failures of security change management is that it is perceived as a project instead of a program, and is therefore mistakenly assumed to have an end. Once more unto the breach explains why information security is an ongoing process, using the role of project manager on a program of change to highlight the various incidents and issues that arise on an almost daily basis – and often go unnoticed.
A major challenge for the ISM is achieving all-important buy-in from their colleagues. Once more unto the breach explains how to express the importance of the tasks you are undertaking in language that executive management will understand. You’ll also discover the importance of having a camera with you at all times.
For too long, security has been seen as more of an inhibitor than an enabler. Once more unto the breach is an invaluable resource that will help you improve this perception, and achieve better overall information protection results as a result.
About the author
Andrea C Simmons is an information governance specialist with extensive experience in the private and public sectors. She has made significant contributions to the development of standards and industry research, and is currently working on a PhD in information assurance. She writes articles and blogs, and presents at conferences, seminars, and workshops. Andrea is a member of many professional bodies and has just been awarded Senior Member status by the Information Systems Security Association (ISSA).
Buy this book and understand the latest challenges information security managers face.
Table of contents
- Cover
- Once more unto the Breach
- Title Page
- Copy Page
- Preface
- About The Author
- Acknowledgements
- Contents
- Introduction
- Chapter 1: August: Pulling a team together
- Chapter 2: September: Street trash
- Chapter 3: October: Compliance may be only skin deep
- Chapter 4: November: How remote is remote?
- Chapter 5: December: Oh, for the sake of yet another proposal
- Chapter 6: January: A battle won
- Chapter 7: February: Money doesn’t buy happiness
- Chapter 8: March: Slipping through the net
- Chapter 9: April: Linking InfoSec with InfoGov
- Chapter 10: May: Politics and management
- Chapter 11: June: What the auditors shouldn’t know
- Chapter 12: July: Journey’s end… and conclusion
- Appendix 1: Security Awareness Themes
- Appendix 2: ISM Activities
- Appendix 3: Resources
- ITG Resources
Product information
- Title: Once More Unto the Breach: Managing information security in an uncertain world
- Author(s):
- Release date: February 2015
- Publisher(s): IT Governance Publishing
- ISBN: 9781849287098
You might also like
book
Bring Your Own Devices (BYOD) Survival Guide
Where end-users once queued up to ask the IT department for permission to buy a new …
book
Security and Privacy in Cyber-Physical Systems
Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this …
book
The Internet of Things: How Smart TVs, Smart Cars, Smart Homes, and Smart Cities Are Changing the World
How the Internet of Things will change your life: all you need to know, in plain …
book
Network Attacks and Exploitation
Incorporate offense and defense for a more effective network security strategy Network Attacks and Exploitation provides …