IT Security Risk Control Management An Audit Preparation Plan

Information security is more than configuring firewalls, removing viruses, hacking machines, or setting passwords. Creating and promoting a successful security program requires skills in organizational consulting, diplomacy, change management, risk analysis, and out-of-the-box thinking. IT Security...

Full description

Bibliographic Details
Main Author: Pompon, Raymond
Format: eBook
Language:English
Published: Berkeley, CA Apress 2016, 2016
Edition:1st ed. 2016
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 03322nmm a2200301 u 4500
001 EB001230854
003 EBX01000000000000000874157
005 00000000000000.0
007 cr|||||||||||||||||||||
008 161005 ||| eng
020 |a 9781484221402 
100 1 |a Pompon, Raymond 
245 0 0 |a IT Security Risk Control Management  |h Elektronische Ressource  |b An Audit Preparation Plan  |c by Raymond Pompon 
250 |a 1st ed. 2016 
260 |a Berkeley, CA  |b Apress  |c 2016, 2016 
300 |a XXXI, 311 p. 33 illus., 11 illus. in color  |b online resource 
505 0 |a Part I: Getting a Handle on Things -- Chapter 1: Why Audit. Chapter 2: Assume Breach. Chapter 3: Risk Analysis: Assets and Impacts. Chapter 4: Risk Analysis: Natural Threats. Chapter 5: Risk Analysis: Adversarial Risk. Part II: Wrangling the Organization -- Chapter 6: Scope. Chapter 7: Governance. Chapter 8: Talking to the Suits. Chapter 9: Talking to the Techs. Chapter 10: Talking to the Users. Part III: Managing Risk with Controls -- Chapter 11: Policy. Chapter 12: Control Design. Chapter 13: Administrative Controls. Chapter 14: Vulnerability Management. Chapter 15: People Controls. Chapter 16: Logical Access Control. Chapter 17: Network Security Controls. Chapter 18: More Technical Controls. Chapter 19: Physical Security Controls. Part IV: Being Audited.-C hapter 20: Response Controls. Chapter 21: Starting the Audit. Chapter 22: Internal Audit. Chapter 23: Third Party Security. Chapter 24: Post Audit Improvement. 
653 |a Computer security 
653 |a Information Systems Applications (incl. Internet) 
653 |a Security 
653 |a Application software 
653 |a Data protection 
653 |a Systems and Data Security 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
856 4 0 |u https://doi.org/10.1007/978-1-4842-2140-2?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 005.8 
520 |a Information security is more than configuring firewalls, removing viruses, hacking machines, or setting passwords. Creating and promoting a successful security program requires skills in organizational consulting, diplomacy, change management, risk analysis, and out-of-the-box thinking. IT Security Risk Control Management provides step-by-step guidance for IT professionals on how to craft a successful security program. Readers will identify with the paradoxes of information security and discover handy tools that hook security controls into business processes, including: Building a security program that will fit neatly into an organization and change dynamically to suit both the needs of the organization and survive constant changing threats Preparing for and passing such common audits as PCI-DSS, SSAE-16, and ISO 27001. Calibrating the scope, and customizing security controls to fit into an organization’s culture. Implementing the most challenging processes, pointing out common pitfalls and distractions. Framing security and risk issues to be clear and actionable so that decision makers, technical personnel, and users will listen and value your advice. With IT Security Risk Control Management, you will be able to construct an information security program, from inception to audit, with enduring, practical, hands-on advice, and actionable strategies for IT professionals