Deploy information security across the business
Knowing about information security is not enough. You also have to deploy it across the business - which means convincing management of its importance. Learn how with this essential guide!
Information technology plays a fundamental role in the operations of any modern business. While the confidentiality and integrity of your organisation's information have to be protected, a business still needs to have this information readily available in order to be able to function from day to day. If you are an information security practitioner, you need to be able to sell complex and often technical solutions to boards and management teams.
Sell information security to the board
Persuading the board to invest in information security measures requires sales skills. As an information security professional, you are a scientific and technical specialist; and yet you need to get your message across to people whose primary interests lie elsewhere, in turnover and overall performance. In other words, you need to develop sales and marketing skills.
This pocket guide will help you with the essential sales skills that persuade company directors to commit money and resources to your information security initiatives.
How this book can help information security professionals:
- Understand basic sales techniques Find out what to do to capture the attention of management and win them over
- Understand how to present yourself Present yourself so that management takes you seriously, and ensure your proposal receives a proper hearing.
- Find out how to earn management's trust This guide shows you how to persuade management that you are the kind of information security professional who is interested in supporting, rather than impeding, business success.
- Learn how to craft a successful proposal This guide offers you invaluable tips on how to write a proposal that will communicate your ideas effectively to senior executives.
Table of contents
- Title page
- Chapter 1: Carelessness
- Chapter 2: Accidental Disclosure
- Chapter 3: People are Intelligent
- Chapter 4: An Aside: Password Policies
- Chapter 5: People are Helpful and Trusting
- Chapter 6: Harnessing Human Qualities to Improve Security
- Chapter 7: Why Raise Awareness?
- Chapter 8: Beyond Awareness
- Chapter 9: The Extended Enterprise
- Chapter 10: Process Design
- Chapter 11: Usability
- Chapter 12: And Finally
- ITG Resources
- Title: Security: The Human Factor
- Release date: December 2010
- Publisher(s): IT Governance Publishing
- ISBN: 9781849281843
You might also like
EnCE EnCase Computer Forensics: The Official EnCase Certified Examiner Study Guide, 3rd Edition
The official, Guidance Software-approved book on the newest EnCE exam! The EnCE exam tests that computer …
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
A computer forensics "how-to" for fighting malicious code and analyzing incidents With our ever-increasing reliance on …
Managing Fraud Risk: A Practical Guide for Directors and Managers
A strategic, practical, cost-effective approach to fraud prevention In troubled economic times, the risk of fraud …
Cyber Forensics: From Data to Digital Evidence
An explanation of the basic principles of data This book explains the basic principles of data …