
Parameters
Meer over het boek
Introduction Part 1: Strategies for Collaboration between Corporate and Information Security 1. Security and Information Technology Alignment Learn how security can benefit from existing information technology policies and explore new security and information technology collaborations. 2. Moving Beyond Convergence Forget the dated and ineffective term convergence and move to clearer ways of describing how to bring business units and technologies together to better address and manage risk. 3. What Are the Characteristics of a Good Relationship Between Corporate Security and Information Security? Learn how to develop a positive relationship between corporate security and information security with these suggestions from experienced security professionals. Part 2: Emerging Issues in Information Protection 4. Mobile Insecurity Tips and tricks to develop effective security policies that help safeguard mobile assets. 5. Security in Cloud Computing: How Is It Different? Four experts compare security issues in cloud computing with those commonly found in more traditional outsourced services. 6. The Risks of Web-Based Applications in the Workplace Three distinguished security professionals share their experiences with the use of web-based applications in the workplace. 7. Leveraging Information Lifecycle Management for Convergence and Compliance A primer on how to leverage information lifecycle management for security convergence and the protection of information assets. 8. Preventing Identity Theft by Protecting Your Data Learn how to protect your company from data breaches with these security strategies. 9. Protecting Your Company's Intellectual Property Four experts share tips for protecting corporate intellectual property through risk management policies and procedures. Part 3: Information Protection Regulations and Standards 10. The PCI Data Security Standard: Compliance Lessons Learned One experienced security executive shares advice for implementing the Payment Card Industry (PCI) Data Security Standard (DSS). 11. Is Your Data Leaking? Protect your company's data with these tips for making sure data doesn't leave the organization in an unauthorized way or, when authorized, in an insecure way. 12. Aiming for National Cybersecurity Experienced security professionals discuss recent cybersecurity breaches and call for increased public-private collaboration for national cybersecurity. 13. Understanding the FRCP's eDiscovery Rules Demystify the Federal Rules of Civil Procedure (FRCP) and learn how to protect your company's electronically stored information with these steps for compliance.
Een boek kopen
Security Leader Insights for Information Protection, Bob Fahy
- Taal
- Jaar van publicatie
- product-detail.submit-box.info.binding
- (Paperback)
Betaalmethoden
Nog niemand heeft beoordeeld.