Freshly Printed - allow 10 days lead
The Information Systems Security Officer's Guide
Establishing and Managing a Cyber Security Program
This practical guide presents advice on establishing, managing, and evaluating a successful information protection program in a corporation or government agency, covering everything from effective communication to career guidance for the information security officer working in today’s global marketplace
Gerald L. Kovacich (Author)
9780128021903
Paperback, published 25 January 2016
360 pages
22.9 x 15.1 x 2.3 cm, 0.48 kg
"...this book is not just for aspiring cyber security officers – it’s also a great read for other professionals in management positions as they should know what cyber security officers do and struggle with." --Help Net Security
Approx.350 pages
SECTION I: THE WORKING ENVIRONMENT OF THE CYBER SECURITY OFFICER1. Understanding the Past and Present Cyber-Information World Environment 2. Understanding the Past and Present Global Business and Management Environment3. An Overview of Related World Views of Cyber Security4. A Glimpse at the History of Technology5. Understanding Today’s Threats in the Cyber Vapor - "War Stories" from the Front Lines SECTION II: THE DUTIES AND RESPONSIBILITIES OF A CYBER SECURITY OFFICER6. The Cyber Security Officer’s Position, Duties and Responsibilities 7. The Cyber Security Strategic, Tactical, and Annual Plans 8. Establishing a Cyber Security Program and Cyber Security Organization 9. Determining and Establishing Cyber Security Functions 10. Establishing a Metrics Management System 11. Annual Re-Evaluation and Future Plan12. High Technology Fraud and Other Crimes' Investigative Support SECTION III: GLOBAL, PROFESSIONAL, AND PERSONAL CHALLENGES OF A CYBER SECURITY OFFICER13. Introduction to Global Information Warfare14. The Cyber Security Officer, and Privacy, Ethical, Liability Issues 15. Cyber Security Officer Career Development: Marketing Yourself, Lecturing, and Consulting 16. 21st Century Challenges for the Cyber Security Officer
Subject Areas: Computer security [UR], Management of specific areas [KJMV]