Deploy information security across the business
Knowing about information security is not enough. You also have to deploy it across the business - which means convincing management of its importance. Learn how with this essential guide!
Information technology plays a fundamental role in the operations of any modern business. While the confidentiality and integrity of your organisation's information have to be protected, a business still needs to have this information readily available in order to be able to function from day to day. If you are an information security practitioner, you need to be able to sell complex and often technical solutions to boards and management teams.
Sell information security to the board
Persuading the board to invest in information security measures requires sales skills. As an information security professional, you are a scientific and technical specialist; and yet you need to get your message across to people whose primary interests lie elsewhere, in turnover and overall performance. In other words, you need to develop sales and marketing skills.
This pocket guide will help you with the essential sales skills that persuade company directors to commit money and resources to your information security initiatives.
How this book can help information security professionals:
- Understand basic sales techniques Find out what to do to capture the attention of management and win them over
- Understand how to present yourself Present yourself so that management takes you seriously, and ensure your proposal receives a proper hearing.
- Find out how to earn management's trust This guide shows you how to persuade management that you are the kind of information security professional who is interested in supporting, rather than impeding, business success.
- Learn how to craft a successful proposal This guide offers you invaluable tips on how to write a proposal that will communicate your ideas effectively to senior executives.
Table of contents
- Title page
- Chapter 1: Carelessness
- Chapter 2: Accidental Disclosure
- Chapter 3: People are Intelligent
- Chapter 4: An Aside: Password Policies
- Chapter 5: People are Helpful and Trusting
- Chapter 6: Harnessing Human Qualities to Improve Security
- Chapter 7: Why Raise Awareness?
- Chapter 8: Beyond Awareness
- Chapter 9: The Extended Enterprise
- Chapter 10: Process Design
- Chapter 11: Usability
- Chapter 12: And Finally
- ITG Resources
- Title: Security: The Human Factor
- Release date: December 2010
- Publisher(s): IT Governance Publishing
- ISBN: 9781849281843
You might also like
You, Only Better
If you want to be happy, fulfilled and energised its probably best not to obsess over …
Hands-On Machine Learning with Scikit-Learn, Keras, and TensorFlow, 2nd Edition
Through a series of recent breakthroughs, deep learning has boosted the entire field of machine learning. …
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art …
Fundamentals of Information Systems Security
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Fundamentals of …