IT Security Management 100 Success Secrets 100 Most Asked Questions: The Missing IT Security Management Control, Plan, Implementation, Evaluation and Maintenance Guide Second Edition Lance Batten
Notice of Rights All rights reserved. No part of this book may be reproduced or transmitted in any form by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher.
Notice of Liability The information in this book is distributed on an "As Is" basis without warranty. While every precaution has been taken in the preparation of the book, neither the author nor the publisher shall have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the instructions contained in this book or by the products described in it.
Trademarks
Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations appear as requested by the owner of the trademark. All other product names and services identified throughout this book are used in editorial fashion only and for the benefit of such companies with no intention of infringement of the trademark. No such use, or the use of any trade name, is intended to convey endorsement or other affiliation with this book.
Write a review to receive any free eBook from our Catalog - $99
Value!
If you recently bought this book we would love to hear from you! Benefit from receiving a free eBook from our catalog at http://www.emereo.org/ if you write a review on Amazon (or the online store where you purchased this book) about your last purchase!
How does it work?
To post a review on Amazon, just log in to your account and click on the Create your own review button (under Customer Reviews) of the relevant product page. You can find examples of product reviews in Amazon. If you purchased from another online store, simply follow their procedures.
What happens when I submit my review?
Once you have submitted your review, send us an email at . Pick any book you like from the catalog, up to $99 RRP. You will receive an
email with your eBook as download link. It is that simple!
3
IT Security Management 100 Success Secrets
100 Success Secrets: Second Edition is not about the ins and outs of IT Security Management. Instead, it answers the top 100 questions that we come across in forums, through consultancy and education programs. It gives you succinct answers to those questions, with tips that have never before been offered in print.
This book is also not about IT Security Management's best practice and standards details. Instead, it introduces everything you want to know in short, sharp detail, so that you can learn about IT Security Management.
Lance Batten.
4
Table of Contents
INSTITUTE OF INFORMATION SECURITY PROFESSIONALS: PROVIDING A VENUE
FOR SECURITY SPECIALISTS TO ENHANCE THEIR SKILLS ..........................................12
WAR-FREE WORLD: THE BRITISH AMERICAN SECURITY COUNCIL ..........................14
BS7799: THE BRITISH STANDARD ON INFORMATION SECURITY MANAGEMENT (ISMS) ....................................................................................................................15
CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL: SECURING INFORMATION .......................................................................................................17
IMPORTANT TASKS OF INFORMATION SECURITY SPECIALIST.................................19
INFORMATION SECURITY STANDARDS: HELPING COMPANIES DEFEND THEIR INFORMATION NETWORK......................................................................................21
IMPORTANT CONSIDERATIONS FOR BUILDING INFORMATION SECURITY STRATEGY
..............................................................................................................................23
INFORMATION SECURITY SURVEY: SHOWING THE CURRENT STATE OF NETWORK SECURITY ...............................................................................................................25
INFORMATION SECURITY THREATS: A GROWING CORPORATE CONCERN ..............27
HOW TO BECOME A MEMBER OF INSTITUTE OF INFORMATION SECURITY PROFESSIONALS .....................................................................................................29
IMPORTANT FEATURES OF IT NETWORK SECURITY ................................................31
HOW TO CONDUCT IT SECURITY AUDIT IN 3 SIMPLE STEPS ....................................33
PROVIDING DEDICATED SECURITY SERVICE FOR BUSINESSES ................................35
IT SECURITY CONFERENCES: PROVIDING SECURITY SOLUTIONS AGAINST NEW THREATS ................................................................................................................37
THE BENEFITS OF IT SECURITY CONSULTANCY SERVICES ........................................39
FACTORS TO CONSIDER BEFORE HIRING IT SECURITY CONSULTANTS ....................41
IT SECURITY COURSES: BUILDING SECURITY CAPABILITIES OF IT STAFF ..................43
BEST SOURCES OF IT SECURITY INFORMATION ......................................................45
THE NEED TO STANDARDIZE ETHICAL IT SECURITY ISSUES .....................................47
IT SECURITY: IS IT THE HOTTEST IT JOB TODAY? .....................................................49
TWO CRITICAL AREAS OF IT SECURITY MANAGEMENT...........................................50
THE NEED FOR IT SECURITY MANAGER ..................................................................52
WHY THE IT SECURITY MARKET IS GROWING.........................................................54
IT SECURITY NEWS PORTALS: .................................................................................56
FUNCTIONS OF AN IT SECURITY OFFICER................................................................58
FEATURES OF GOOD IT SECURITY POLICIES ............................................................60
WHAT ARE THE IMPORTANT IT SECURITY QUALIFICATIONS...................................62
IT SECURITY RECRUITMENT AGENCIES: PROVIDING EXPERT MANPOWER FOR COMPANIES ...........................................................................................................64
IT SECURITY RISK MANUALS: GIVING IT MANAGERS VALUABLE ASSISTANCE.........66
EXPECTED GROWTH OF IT SECURITY SALES ............................................................68
IT SECURITY SERVICES: MAKING SECURITY MANAGEMENT EASIER .......................70
IT SECURITY SOFTWARE: THE BUILDING BLOCK OF SECURITY NETWORK ..............72
3 STEPS TO DETERMINE THE ACQUISITION OF IT SECURITY SOLUTIONS.................74
THE BENEFIT OF HAVING IT SECURITY SYSTEMS .....................................................76
GET IT SECURITY TRAINING AND BE HIRED.............................................................78
MSC COMPUTER SECURITY AND WHAT IT OFFERS .................................................80
Next page