Deploy information security across the business
Knowing about information security is not enough. You also have to deploy it across the business - which means convincing management of its importance. Learn how with this essential guide!
Information technology plays a fundamental role in the operations of any modern business. While the confidentiality and integrity of your organisation's information have to be protected, a business still needs to have this information readily available in order to be able to function from day to day. If you are an information security practitioner, you need to be able to sell complex and often technical solutions to boards and management teams.
Sell information security to the board
Persuading the board to invest in information security measures requires sales skills. As an information security professional, you are a scientific and technical specialist; and yet you need to get your message across to people whose primary interests lie elsewhere, in turnover and overall performance. In other words, you need to develop sales and marketing skills.
This pocket guide will help you with the essential sales skills that persuade company directors to commit money and resources to your information security initiatives.
How this book can help information security professionals:
- Understand basic sales techniques Find out what to do to capture the attention of management and win them over
- Understand how to present yourself Present yourself so that management takes you seriously, and ensure your proposal receives a proper hearing.
- Find out how to earn management's trust This guide shows you how to persuade management that you are the kind of information security professional who is interested in supporting, rather than impeding, business success.
- Learn how to craft a successful proposal This guide offers you invaluable tips on how to write a proposal that will communicate your ideas effectively to senior executives.
Table of contents
- Title page
- Chapter 1: Carelessness
- Chapter 2: Accidental Disclosure
- Chapter 3: People are Intelligent
- Chapter 4: An Aside: Password Policies
- Chapter 5: People are Helpful and Trusting
- Chapter 6: Harnessing Human Qualities to Improve Security
- Chapter 7: Why Raise Awareness?
- Chapter 8: Beyond Awareness
- Chapter 9: The Extended Enterprise
- Chapter 10: Process Design
- Chapter 11: Usability
- Chapter 12: And Finally
- ITG Resources
- Title: Security: The Human Factor
- Release date: December 2010
- Publisher(s): IT Governance Publishing
- ISBN: 9781849281843
You might also like
8 Steps to Better Security
Harden your business against internal and external cybersecurity threats with a single accessible resource. In 8 …
Managing Fraud Risk: A Practical Guide for Directors and Managers
A strategic, practical, cost-effective approach to fraud prevention In troubled economic times, the risk of fraud …
Insider Threat: A Guide to Understanding, Detecting, and Defending Against the Enemy from Within
Learn how to build a defense program against insider threats Insiders are not always employees and …
People-Centric Security: Transforming Your Enterprise Security Culture
A culture hacking how to complete with strategies, techniques, and resources for securing the most volatile …