IT Governance

Author: Alan Calder
Publisher: Kogan Page Publishers
ISBN: 9780749474065
Release Date: 2015-09-03
Genre: Business & Economics

Faced with constant and fast-evolving threats to information security and with a growing exposure to cyber risk, managers at all levels and in organizations of all sizes need a robust IT governance system. Now in its sixth edition, the bestselling IT Governance provides best-practice guidance for companies looking to protect and enhance their information security management systems and protect themselves against cyber threats. IT Governance has been fully updated to take account of current cyber security and advanced persistent threats and reflects the latest regulatory and technical developments, including the 2013 updates to ISO27001/ISO27002. Changes for this edition include: Full updates throughout in line with the revised ISO27001 standard and accompanying ISO27002 code of practice for information security controls Full coverage of changes to data-related regulations in different jurisdictions and advice on compliance Guidance on the options for continual improvement models and control frameworks made possible by the new standard New developments in cyber risk and mitigation practices The latest technological developments that affect IT governance and security Guidance on the new information security risk assessment process and treatment requirements Including coverage of key international markets including the UK, North America, the EU and Asia Pacific, IT Governance is the definitive guide to implementing an effective information security management and governance system.

IT Governance

Author: Alan Calder
Publisher: Kogan Page Publishers
ISBN: 9780749464868
Release Date: 2012-04-03
Genre: Business & Economics

For many companies, their intellectual property can often be more valuable than their physical assets. Having an effective IT governance strategy in place can protect this intellectual property, reducing the risk of theft and infringement. Data protection, privacy and breach regulations, computer misuse around investigatory powers are part of a complex and often competing range of requirements to which directors must respond. There is increasingly the need for an overarching information security framework that can provide context and coherence to compliance activity worldwide. IT Governance is a key resource for forward-thinking managers and executives at all levels, enabling them to understand how decisions about information technology in the organization should be made and monitored, and, in particular, how information security risks are best dealt with. The development of IT governance - which recognises the convergence between business practice and IT management - makes it essential for managers at all levels, and in organizations of all sizes, to understand how best to deal with information security risk. The new edition has been full updated to take account of the latest regulatory and technological developments, including the creation of the International Board for IT Governance Qualifications. IT Governance also includes new material on key international markets - including the UK and the US, Australia and South Africa.

IT Governance

Author: Alan Calder
Publisher:
ISBN: 074947405X
Release Date: 2015-03-09
Genre: BUSINESS & ECONOMICS

Faced with constant and fast-evolving threats to information security and with a growing exposure to cyber risk, managers at all levels and in organizations of all sizes need a robust IT governance system. Now in its sixth edition, the bestselling IT Governance provides best-practice guidance for companies looking to protect and enhance their information security management systems and protect themselves against cyber threats. IT Governance has been fully updated to take account of current cyber security and advanced persistent threats and reflects the latest regulatory and technical developments, including the 2013 updates to ISO27001/ISO27002. Changes for this edition include: Full updates throughout in line with the revised ISO27001 standard and accompanying ISO27002 code of practice for information security controls Full coverage of changes to data-related regulations in different jurisdictions and advice on compliance Guidance on the options for continual improvement models and control frameworks made possible by the new standard New developments in cyber risk and mitigation practices The latest technological developments that affect IT governance and security Guidance on the new information security risk assessment process and treatment requirements Including coverage of key international markets including the UK, North America, the EU and Asia Pacific, IT Governance is the definitive guide to implementing an effective information security management and governance system.

IT Governance

Author: Alan Calder
Publisher: Kogan Page Publishers
ISBN: 0749452714
Release Date: 2008
Genre: Business & Economics

Information is widely regarded as the lifeblood of modern business, but organizations are facing a flood of threats to such “intellectual capital” from hackers, viruses, and online fraud. Directors must respond to increasingly complex and competing demands regarding data protection, privacy regulations, computer misuse, and investigatory regulations. IT Governance will be valuable to board members, executives, owners and managers of any business or organization that depends on information. Covering the Sarbanes-Oxley Act (in the US) and the Turnbull Report and the Combined Code (in the UK), the book examines standards of best practice for compliance and data security. Written for companies looking to protect and enhance their information security management systems, it allows them to ensure that their IT security strategies are coordinated, coherent, comprehensive and cost effective.

ISO27001 ISO27002

Author: Alan Calder
Publisher: IT Governance Ltd
ISBN: 9781905356706
Release Date: 2008
Genre: Business & Economics

Management systems and procedural controls are essential components of any really secure information system and, to be effective, need careful planning and attention to detail. This book provides the specification for an information security management system.

EU GDPR A Pocket Guide European

Author: Alan Calder
Publisher: IT Governance Ltd
ISBN: 9781849288569
Release Date: 2017-01-10
Genre: Law

The EU General Data Protection Regulation (GDPR) will unify data protection and simplify the use of personal data across the EU from 25 May 2018, when it will automatically supersede member states’ domestic data protection laws. It will also apply to every organisation in the world that processes personal information of EU residents. The Regulation introduces a number of key changes for all organisations that process EU residents’ personal data. EU GDPR: A Pocket Guide provides an essential introduction to this new data protection law, explaining the Regulation and setting out the compliance obligations for EU organisations.

IT Governance

Author: Alan Calder
Publisher: Kogan Page Publishers
ISBN: 0749443944
Release Date: 2005-01-01
Genre: Business enterprises

"Written for managers, this addresses how they should comply with best practice on the security, confidentiality and integrity of data stored on IT systems." -The Times "Should be read by every computer professional with responsibility for security." -IMIS Journal The development of IT governance - which recognizes the convergence between business and IT management - makes it essential for managers at all levels and in organizations of all sizes to understand how best to deal with information security risks. Also, the Turnbull report on company risk management (alongside laws and regulations throughout the OECD) gives company directors a legal responsibility to act on computer and information security. Containing the latest revisions to BS7799 and ISO17799, this book guides business managers through the issues involved in achieving ISO certification in Information Security Management and covers all aspects of data security.

Information Security Risk Management for ISO27001 ISO27002

Author: Alan Calder
Publisher: IT Governance Ltd
ISBN: 9781849280440
Release Date: 2010-04-27
Genre: Business & Economics

Drawing on international best practice, including ISO/IEC 27005, NIST SP800-30 and BS7799-3, the book explains in practical detail how to carry out an information security risk assessment. It covers key topics, such as risk scales, threats and vulnerabilities, selection of controls, and roles and responsibilities, and includes advice on choosing risk assessment software.

Nine Steps to Success

Author: Alan Calder
Publisher: IT Governance Ltd
ISBN: 9781849285117
Release Date: 2013-10-03
Genre: Business enterprises

Based on his many years of first-hand experience with ISO27001, Alan Calder covers every single element of the ISO27001 project in simple, non-technical language, including: how to get management and board buy-in; how to get cross-organizational, cross functional buy-in; the gap analysis: how much you really need to do; how to integrate with ISO9001 and other management systems; how to structure and resource your project; whether to use consultants or do it yourself; the timetable and project plan; risk assessment methodologies and tools; the documentation challenges; how to choose a certification body.

Foundations of Information Security Based on ISO27001 and ISO27002 3rd revised edition

Author: Hans Baars
Publisher: Van Haren
ISBN: 9789401805414
Release Date: 2015-04-01
Genre: Education

This book is intended for everyone in an organization who wishes to have a basic understanding of information security. Knowledge about information security is important to all employees. It makes no difference if you work in a profit- or non-profit organization because the risks that organizations face are similar for all organizations.It clearly explains the approaches that most organizations can consider and implement which helps turn Information Security management into an approachable, effective and well-understood tool. It covers: The quality requirements an organization may have for information; The risks associated with these quality requirements; The countermeasures that are necessary to mitigate these risks; Ensuring business continuity in the event of a disaster; When and whether to report incidents outside the organization.The information security concepts in this revised edition are based on the ISO/IEC27001:2013 and ISO/IEC27002:2013 standards. But the text also refers to the other relevant international standards for information security. The text is structured as follows: Fundamental Principles of Security and Information security and Risk management. Architecture, processes and information, needed for basic understanding of what information security is about. Business Assets are discussed. Measures that can be taken to protect information assets. (Physical measures, technical measures and finally the organizational measures.)The primary objective of this book is to achieve awareness by students who want to apply for a basic information security examination. It is a source of information for the lecturer who wants to question information security students about their knowledge. Each chapter ends with a case study. In order to help with the understanding and coherence of each subject, these case studies include questions relating to the areas covered in the relevant chapters. Examples of recent events that illustrate the vulnerability of information are also included.This book is primarily developed as a study book for anyone who wants to pass the ISFS (Information Security Foundation) exam of EXIN. In an appendix an ISFS model exam is given, with feedback to all multiple choice options, so that it can be used as a training for the real ISFS exam.

IT Governance Implementing Frameworks and Standards for the Corporate Governance of IT

Author: Alan Calder
Publisher: IT Governance Ltd
ISBN: 9781905356911
Release Date: 2009-03-13
Genre: Auditing

This new book sets out for managers, executives and IT professionals the practical steps necessary to meet today's corporate and IT governance requirements. It provides practical guidance on how board executives and IT professionals can navigate, integrate and deploy to best corporate and commercial advantage the most widely used frameworks and standards.

Implementing the ISO IEC 27001 Information Security Management System Standard

Author: Edward Humphreys
Publisher: Artech House Publishers
ISBN: 1596931728
Release Date: 2007
Genre: Computers

"Authored by an internationally recognized expert in the field, this book provides an authoritative and clear guide to the ISO/IEC 27000 security standards and their implementation, focusing on the recent ISO/IEC 27001. The book addresses the critical information security management issues that professionals need to understand to protect their businesses' valuable assets, including dealing with business risks, governance, and compliance. Moreover, this resource offers important details on standard accreditation and certification."--BOOK JACKET.

Insider Threat

Author: Julie Mehan
Publisher: IT Governance Ltd
ISBN: 9781849288408
Release Date: 2016-09-20
Genre: Internal security

Every type of organization is vulnerable to insider abuse, errors, and malicious attacks: Grant anyone access to a system and you automatically introduce a vulnerability. Insiders can be current or former employees, contractors, or other business partners who have been granted authorized access to networks, systems, or data, and all of them can bypass security measures through legitimate means. Insider Threat – A Guide to Understanding, Detecting, and Defending Against the Enemy from Within shows how a security culture based on international best practice can help mitigate the insider threat, providing short-term quick fixes and long-term solutions that can be applied as part of an effective insider threat program. Read this book to learn the seven organizational characteristics common to insider threat victims; the ten stages of a malicious attack; the ten steps of a successful insider threat program; and the construction of a three-tier security culture, encompassing artefacts, values, and shared assumptions. Perhaps most importantly, it also sets out what not to do, listing a set of worst practices that should be avoided. About the author Dr Julie Mehan is the founder and president of JEMStone Strategies and a principal in a strategic consulting firm in Virginia. She has delivered cybersecurity and related privacy services to senior commercial, Department of Defense, and federal government clients. Dr Mehan is also an associate professor at the University of Maryland University College, specializing in courses in cybersecurity, cyberterror, IT in organizations, and ethics in an Internet society

Application security in the ISO27001 2013 Environment

Author: Vinod Vasudevan
Publisher: IT Governance Ltd
ISBN: 9781849287685
Release Date: 2015-10-15
Genre: Computers

Application Security in the ISO 27001:2013 Environment explains how organisations can implement and maintain effective security practices to protect their web applications – and the servers on which they reside – as part of a wider information security management system by following the guidance set out in the international standard for information security management, ISO 27001. The book describes the methods used by criminal hackers to attack organisations via their web applications and provides a detailed explanation of how you can combat such attacks by employing the guidance and controls set out in ISO 27001. Product overviewSecond edition, updated to reflect ISO 27001:2013 as well as best practices relating to cryptography, including the PCI SSC’s denigration of SSL in favour of TLS.Provides a full introduction to ISO 27001 and information security management systems, including implementation guidance.Describes risk assessment, management and treatment approaches.Examines common types of web app security attack, including injection attacks, cross-site scripting, and attacks on authentication and session management, explaining how each can compromise ISO 27001 control objectives and showing how to test for each attack type.Discusses the ISO 27001 controls relevant to application security.Lists useful web app security metrics and their relevance to ISO 27001 controls.Provides a four-step approach to threat profiling, and describes application security review and testing approaches.Sets out guidelines and the ISO 27001 controls relevant to them, covering:input validationauthenticationauthorisationsensitive data handling and the use of TLS rather than SSLsession managementerror handling and loggingDescribes the importance of security as part of the web app development process