IT Governance

An International Guide to Data Security and ISO27001/ISO27002

Author: Alan Calder,Steve Watkins

Publisher: Kogan Page Publishers

ISBN: 0749474068

Category: Business & Economics

Page: 360

View: 7496

Faced with constant and fast-evolving threats to information security and with a growing exposure to cyber risk, managers at all levels and in organizations of all sizes need a robust IT governance system. Now in its sixth edition, the bestselling IT Governance provides best-practice guidance for companies looking to protect and enhance their information security management systems and protect themselves against cyber threats. IT Governance has been fully updated to take account of current cyber security and advanced persistent threats and reflects the latest regulatory and technical developments, including the 2013 updates to ISO27001/ISO27002. Changes for this edition include: Full updates throughout in line with the revised ISO27001 standard and accompanying ISO27002 code of practice for information security controls Full coverage of changes to data-related regulations in different jurisdictions and advice on compliance Guidance on the options for continual improvement models and control frameworks made possible by the new standard New developments in cyber risk and mitigation practices The latest technological developments that affect IT governance and security Guidance on the new information security risk assessment process and treatment requirements Including coverage of key international markets including the UK, North America, the EU and Asia Pacific, IT Governance is the definitive guide to implementing an effective information security management and governance system.

IT Governance

An International Guide to Data Security and ISO27001/ISO27002

Author: Alan Calder,Steve Watkins

Publisher: Kogan Page Publishers

ISBN: 0749464860

Category: Business & Economics

Page: 376

View: 2305

For many companies, their intellectual property can often be more valuable than their physical assets. Having an effective IT governance strategy in place can protect this intellectual property, reducing the risk of theft and infringement. Data protection, privacy and breach regulations, computer misuse around investigatory powers are part of a complex and often competing range of requirements to which directors must respond. There is increasingly the need for an overarching information security framework that can provide context and coherence to compliance activity worldwide. IT Governance is a key resource for forward-thinking managers and executives at all levels, enabling them to understand how decisions about information technology in the organization should be made and monitored, and, in particular, how information security risks are best dealt with. The development of IT governance - which recognises the convergence between business practice and IT management - makes it essential for managers at all levels, and in organizations of all sizes, to understand how best to deal with information security risk. The new edition has been full updated to take account of the latest regulatory and technological developments, including the creation of the International Board for IT Governance Qualifications. IT Governance also includes new material on key international markets - including the UK and the US, Australia and South Africa.

IT Governance

An International Guide to Data Security and ISO27001/ISO27002

Author: Alan Calder,Steve Watkins

Publisher: N.A

ISBN: 9780749474058

Category: BUSINESS & ECONOMICS

Page: 358

View: 7617

Faced with constant and fast-evolving threats to information security and with a growing exposure to cyber risk, managers at all levels and in organizations of all sizes need a robust IT governance system. Now in its sixth edition, the bestselling IT Governance provides best-practice guidance for companies looking to protect and enhance their information security management systems and protect themselves against cyber threats. IT Governance has been fully updated to take account of current cyber security and advanced persistent threats and reflects the latest regulatory and technical developments, including the 2013 updates to ISO27001/ISO27002. Changes for this edition include: Full updates throughout in line with the revised ISO27001 standard and accompanying ISO27002 code of practice for information security controls Full coverage of changes to data-related regulations in different jurisdictions and advice on compliance Guidance on the options for continual improvement models and control frameworks made possible by the new standard New developments in cyber risk and mitigation practices The latest technological developments that affect IT governance and security Guidance on the new information security risk assessment process and treatment requirements Including coverage of key international markets including the UK, North America, the EU and Asia Pacific, IT Governance is the definitive guide to implementing an effective information security management and governance system.

ISO27001/ISO27002

A Pocket Guide

Author: Alan Calder

Publisher: IT Governance Ltd

ISBN: 1905356706

Category: Business & Economics

Page: 72

View: 7621

Management systems and procedural controls are essential components of any really secure information system and, to be effective, need careful planning and attention to detail. This book provides the specification for an information security management system.

IT Governance

A Manager's Guide to Data Security and BS 7799/ISO 17799

Author: Alan Calder,Steve Watkins

Publisher: Kogan Page Publishers

ISBN: 9780749443948

Category: Business enterprises

Page: 368

View: 3493

"Written for managers, this addresses how they should comply with best practice on the security, confidentiality and integrity of data stored on IT systems." -The Times "Should be read by every computer professional with responsibility for security." -IMIS Journal The development of IT governance - which recognizes the convergence between business and IT management - makes it essential for managers at all levels and in organizations of all sizes to understand how best to deal with information security risks. Also, the Turnbull report on company risk management (alongside laws and regulations throughout the OECD) gives company directors a legal responsibility to act on computer and information security. Containing the latest revisions to BS7799 and ISO17799, this book guides business managers through the issues involved in achieving ISO certification in Information Security Management and covers all aspects of data security.

EU GDPR: A Pocket Guide, School's edition

Author: Alan Calder

Publisher: IT Governance Publishing Ltd

ISBN: 1787780058

Category: Law

Page: 92

View: 2538

The EU General Data Protection Regulation (GDPR) unifies data protection and unifies data protection across the EU. It applies to every organisation in the world that handles EU residents’ personal data – which includes schools. The Regulation introduces a number of key changes for schools – and the change from compliance with the Data Protection Act 1998 (DPA) to GDPR compliance is a complex one. We have revised our popular EU GDPR – A Pocket Guide to include specific expectations of and requirements for schools, and provide an accessible overview of the changes you need to make to comply with the Regulation. EU GDPR – A Pocket Guide Schools’ Edition sets out: A brief history of data protection and national data protection laws in the EU, including as the UK’s DPA);Explanations of the terms and definitions used in the GDPR;The key requirements of the GDPR;The need to appoint a data protection officer (DPO);The lawful basis of processing data and when consent is needed;How to comply with the Regulation; andA full index of the Regulation, enabling you to find relevant articles quickly and easily. This pocket guide is the ideal resource for anyone wanting a clear, concise primer on the GDPR.

Information Security Risk Management for ISO27001/ISO27002

Author: Alan Calder,Steve G. Watkins

Publisher: IT Governance Ltd

ISBN: 1849280444

Category: Business & Economics

Page: 187

View: 1076

Drawing on international best practice, including ISO/IEC 27005, NIST SP800-30 and BS7799-3, the book explains in practical detail how to carry out an information security risk assessment. It covers key topics, such as risk scales, threats and vulnerabilities, selection of controls, and roles and responsibilities, and includes advice on choosing risk assessment software.

IT Governance

A Manager's Guide to Data Security and ISO 27001/ISO 27002

Author: Alan Calder,Steve Watkins

Publisher: Kogan Page Publishers

ISBN: 9780749452711

Category: Business & Economics

Page: 372

View: 2774

Information is widely regarded as the lifeblood of modern business, but organizations are facing a flood of threats to such “intellectual capital” from hackers, viruses, and online fraud. Directors must respond to increasingly complex and competing demands regarding data protection, privacy regulations, computer misuse, and investigatory regulations. IT Governance will be valuable to board members, executives, owners and managers of any business or organization that depends on information. Covering the Sarbanes-Oxley Act (in the US) and the Turnbull Report and the Combined Code (in the UK), the book examines standards of best practice for compliance and data security. Written for companies looking to protect and enhance their information security management systems, it allows them to ensure that their IT security strategies are coordinated, coherent, comprehensive and cost effective.

IT Governance Implementing Frameworks and Standards for the Corporate Governance of IT

Author: Alan Calder

Publisher: IT Governance Ltd

ISBN: 1905356919

Category: Auditing

Page: 209

View: 1827

This new book sets out for managers, executives and IT professionals the practical steps necessary to meet today's corporate and IT governance requirements. It provides practical guidance on how board executives and IT professionals can navigate, integrate and deploy to best corporate and commercial advantage the most widely used frameworks and standards.

Foundations of Information Security Based on ISO27001 and ISO27002 - 3rd revised edition

Author: Hans Baars,Jule Hintzbergen,André Smulders,Kees Hintzbergen

Publisher: Van Haren

ISBN: 9401805415

Category: Education

Page: N.A

View: 8551

This book is intended for everyone in an organization who wishes to have a basic understanding of information security. Knowledge about information security is important to all employees. It makes no difference if you work in a profit- or non-profit organization because the risks that organizations face are similar for all organizations.It clearly explains the approaches that most organizations can consider and implement which helps turn Information Security management into an approachable, effective and well-understood tool. It covers: The quality requirements an organization may have for information; The risks associated with these quality requirements; The countermeasures that are necessary to mitigate these risks; Ensuring business continuity in the event of a disaster; When and whether to report incidents outside the organization.The information security concepts in this revised edition are based on the ISO/IEC27001:2013 and ISO/IEC27002:2013 standards. But the text also refers to the other relevant international standards for information security. The text is structured as follows: Fundamental Principles of Security and Information security and Risk management. Architecture, processes and information, needed for basic understanding of what information security is about. Business Assets are discussed. Measures that can be taken to protect information assets. (Physical measures, technical measures and finally the organizational measures.)The primary objective of this book is to achieve awareness by students who want to apply for a basic information security examination. It is a source of information for the lecturer who wants to question information security students about their knowledge. Each chapter ends with a case study. In order to help with the understanding and coherence of each subject, these case studies include questions relating to the areas covered in the relevant chapters. Examples of recent events that illustrate the vulnerability of information are also included.This book is primarily developed as a study book for anyone who wants to pass the ISFS (Information Security Foundation) exam of EXIN. In an appendix an ISFS model exam is given, with feedback to all multiple choice options, so that it can be used as a training for the real ISFS exam.

Application security in the ISO27001:2013 Environment

Author: Vinod Vasudevan,Anoop Mangla,Firosh Ummer,Sachin Shetty,Sangita Pakala,Siddharth Anbalahan

Publisher: IT Governance Ltd

ISBN: 1849287686

Category: Computers

Page: 254

View: 433

Application Security in the ISO 27001:2013 Environment explains how organisations can implement and maintain effective security practices to protect their web applications – and the servers on which they reside – as part of a wider information security management system by following the guidance set out in the international standard for information security management, ISO 27001. The book describes the methods used by criminal hackers to attack organisations via their web applications and provides a detailed explanation of how you can combat such attacks by employing the guidance and controls set out in ISO 27001. Product overviewSecond edition, updated to reflect ISO 27001:2013 as well as best practices relating to cryptography, including the PCI SSC’s denigration of SSL in favour of TLS.Provides a full introduction to ISO 27001 and information security management systems, including implementation guidance.Describes risk assessment, management and treatment approaches.Examines common types of web app security attack, including injection attacks, cross-site scripting, and attacks on authentication and session management, explaining how each can compromise ISO 27001 control objectives and showing how to test for each attack type.Discusses the ISO 27001 controls relevant to application security.Lists useful web app security metrics and their relevance to ISO 27001 controls.Provides a four-step approach to threat profiling, and describes application security review and testing approaches.Sets out guidelines and the ISO 27001 controls relevant to them, covering:input validationauthenticationauthorisationsensitive data handling and the use of TLS rather than SSLsession managementerror handling and loggingDescribes the importance of security as part of the web app development process

Implementing the ISO/IEC 27001 Information Security Management System Standard

Author: Edward Humphreys

Publisher: Artech House Publishers

ISBN: 9781596931725

Category: Computers

Page: 265

View: 1223

"Authored by an internationally recognized expert in the field, this book provides an authoritative and clear guide to the ISO/IEC 27000 security standards and their implementation, focusing on the recent ISO/IEC 27001. The book addresses the critical information security management issues that professionals need to understand to protect their businesses' valuable assets, including dealing with business risks, governance, and compliance. Moreover, this resource offers important details on standard accreditation and certification."--BOOK JACKET.

IT Governance

A Pocket Guide

Author: Alan Calder

Publisher: IT Governance Ltd

ISBN: 1905356250

Category: Business & Economics

Page: 46

View: 3193

This pocket guide is designed to provide the reader with a basic understanding of how an organization's Information Technology supports and enables the achievement of its strategies and objectives. IT Governance recognizes that Information and Information Technology is at the heart of the modern economy - and at the heart of the modern business. It is a critical component of corporate governance and this pocket guide provides an introduction on how to approach this complex subject. This pocket guide describes the drivers for IT governance; why it matters; the relationship between IT governance, risk management, information risk, project governance and compliance risk; lists the symptoms of inadequate IT governance and the benefits that can be won by implementing an IT governance framework, and describes - in principle - how to go about doing this.

Nine Steps to Success

An ISO27001:2013 Implementation Overview

Author: Alan Calder

Publisher: IT Governance Ltd

ISBN: 184928511X

Category: Business enterprises

Page: 98

View: 7823

Based on his many years of first-hand experience with ISO27001, Alan Calder covers every single element of the ISO27001 project in simple, non-technical language, including: how to get management and board buy-in; how to get cross-organizational, cross functional buy-in; the gap analysis: how much you really need to do; how to integrate with ISO9001 and other management systems; how to structure and resource your project; whether to use consultants or do it yourself; the timetable and project plan; risk assessment methodologies and tools; the documentation challenges; how to choose a certification body.

IT Governance

Guidelines for Directors

Author: Alan Calder

Publisher: IT Governance Ltd

ISBN: 1905356021

Category: COMPUTERS

Page: 182

View: 5378

This important new book - 'IT Governance: Guidelines for Directors' provides directors, executives, managers and professional advisers with clear,pragmatic guidelines for ensuring that IT and the business work together for thesamestrategic objectives.

Nine Steps to Success

An ISO 27001 Implementation Overview

Author: Alan Calder

Publisher: It Governance Limited

ISBN: 9781905356126

Category: Computers

Page: 116

View: 851

Read the world's first practical hard copy/soft cover guidance (also available in eBook format) on achieving ISO 27001 certification and the 9 essential steps to an effective ISMS implementation - . 9 critical steps that are the absolute difference between project success and abject failure Read the introduction to the book online now. This book is the ideal guide for anyone tackling - or about to tackle - ISO27001 for the first time. It gives a clear overview of: how to get management and board buy-in; how to get cross-organizational, cross functional buy-in; the gap analysis: how much do you really need to do? the relationship between ISO27001 and ISO17799; how to integrate with ISO9001 and other management systems; how to structure and resource your project; use consultants or do it youself? the PDCA cycle; the timetable and project plan; risk

Insider Threat

A Guide to Understanding, Detecting, and Defending Against the Enemy from Within

Author: It Governance

Publisher: It Governance Limited

ISBN: 9781849288392

Category: Business & Economics

Page: 312

View: 7077

Insider Threat - A Guide to Understanding, Detecting, and Defending Against the Enemy from Withinlooks beyond perimeter protection tools, and shows how a security culture based on international best practice can help mitigate the insider threat to your security. It also provides some short-term quick fixes that can be applied as your organizations builds an effective insider threat programme. Read this book to learn: .The seven organizational characteristics common to insider threat victims. .The ten stages of a malicious attack. .The ten steps of a successful insider threat programme. .How to construct a three-tier security culture, encompassing artefacts, values and shared assumptions. Insider Threatdetails the measures that organizations can implement to ensure high-impact quick wins, mapping appropriate security controls from the ISO 27001, ISO 27002, and NIST SP 800-53 standards to the following points, and more: .Risk mitigation and the eight steps of a risk assessment .The importance of training and awareness, and conducting staff background screening .Monitoring and auditing the activities of general and privileged users, and quickly responding to suspicious behaviors .Metrics to measure insider threat behavior and mitigation .The challenge of external or temporary insiders (such as consultants, support contractors, partners, service providers, temporary employees) .Layering physical and digital defenses to provide defense in depth .The importance of conducting regular penetration testing to evaluate security controls .Limiting, monitoring and controlling remote access and mobile device use .Ensuring supply-chain security .Maintaining an incident management capability It also sets out what not to do, listing a set of worst practices that should be avoided."

International IT Governance

An Executive Guide to ISO 17799/ISO 27001

Author: Alan Calder

Publisher: Kogan Page Publishers

ISBN: 074946268X

Category: Business & Economics

Page: 384

View: 1257

The development of IT Governance, which recognizes the convergence between business and IT management, makes it essential for managers at all levels and in organizations of all sizes to understand how best to deal with information security risks. International IT Governance explores new legislation, including the launch of ISO/IEC 27001, which makes a single, global standard of information security best practice available.