Once more unto the Breach  
Published by IT Governance Publishing
Publication Date:  Available in all formats
ISBN: 9781849287104
Pages: 0

EBOOK (EPUB)

EBOOK (PDF)

ISBN: 9781849287104 Price: INR 3144.75
Add to cart Buy Now
The role of the information security manager has changed. Have you? The challenges you face as an information security manager (ISM) have increased enormously since the first edition of Once more unto the breach was published. What seemed exceptional in 2011 is the norm in 2015: vulnerabilities have been experienced across all operating systems, millions of individuals have been affected by data breaches, and countless well-known companies have fallen victim to cyber attacks. It’s your duty to ensure that your organisation isn’t next. The ISM’s information security responsibilities now cover all aspects of the organisation and its operations, and relate to the security of information in all forms, locations and transactions across the organisation – and beyond. Topics covered include: Project management Physical security Password management Consumerisation (BYOD) Audit log management Vulnerability management Cloud computing Incident reporting Penetration testing Linking information security with records management Privacy impact assessments Internal auditing In this revised edition of Once more unto the breach, Andrea C Simmons uses her extensive experience to provide an important insight into the changing role and responsibilities of the ISM, walking you through a typical ISM’s year and highlighting the challenges and pitfalls of an information security programme. One of the key failures of security change management is that it is perceived as a project instead of a programme , and is therefore mistakenly assumed to have an end. Once more unto the breachexplains why information security is an ongoing process, using the role of project manager on a programme of change to highlight the various incidents and issues that arise on an almost daily basis – and often go unnoticed. A major challenge for the ISM is achieving all-important buy-in from their colleagues. Once more unto the breach explains how to express the importance of the tasks you are undertaking in language that executive management will understand. You’ll also discover the importance of having a camera with you at all times. For too long, security has been seen as more of an inhibitor than an enabler. Once more unto the breach is an invaluable resource that will help you improve this perception, and achieve better overall information protection results as a result. About the author Andrea C Simmons is an information governance specialist with extensive experience in the private and public sectors. She has made significant contributions to the development of standards and industry research, and is currently working on a PhD in information assurance. She writes articles and blogs, and presents at conferences, seminars and workshops. Andrea is a member of many professional bodies and has just been awarded Senior Member status by the Information Systems Security Association (ISSA). Buy this book and understand the latest challenges information security managers face.
Rating
Description
The role of the information security manager has changed. Have you? The challenges you face as an information security manager (ISM) have increased enormously since the first edition of Once more unto the breach was published. What seemed exceptional in 2011 is the norm in 2015: vulnerabilities have been experienced across all operating systems, millions of individuals have been affected by data breaches, and countless well-known companies have fallen victim to cyber attacks. It’s your duty to ensure that your organisation isn’t next. The ISM’s information security responsibilities now cover all aspects of the organisation and its operations, and relate to the security of information in all forms, locations and transactions across the organisation – and beyond. Topics covered include: Project management Physical security Password management Consumerisation (BYOD) Audit log management Vulnerability management Cloud computing Incident reporting Penetration testing Linking information security with records management Privacy impact assessments Internal auditing In this revised edition of Once more unto the breach, Andrea C Simmons uses her extensive experience to provide an important insight into the changing role and responsibilities of the ISM, walking you through a typical ISM’s year and highlighting the challenges and pitfalls of an information security programme. One of the key failures of security change management is that it is perceived as a project instead of a programme , and is therefore mistakenly assumed to have an end. Once more unto the breachexplains why information security is an ongoing process, using the role of project manager on a programme of change to highlight the various incidents and issues that arise on an almost daily basis – and often go unnoticed. A major challenge for the ISM is achieving all-important buy-in from their colleagues. Once more unto the breach explains how to express the importance of the tasks you are undertaking in language that executive management will understand. You’ll also discover the importance of having a camera with you at all times. For too long, security has been seen as more of an inhibitor than an enabler. Once more unto the breach is an invaluable resource that will help you improve this perception, and achieve better overall information protection results as a result. About the author Andrea C Simmons is an information governance specialist with extensive experience in the private and public sectors. She has made significant contributions to the development of standards and industry research, and is currently working on a PhD in information assurance. She writes articles and blogs, and presents at conferences, seminars and workshops. Andrea is a member of many professional bodies and has just been awarded Senior Member status by the Information Systems Security Association (ISSA). Buy this book and understand the latest challenges information security managers face.
Table of contents
  • Cover
  • Once more unto the Breach
  • Title Page
  • Copy Page
  • Preface
  • About The Author
  • Acknowledgements
  • Contents
  • Introduction
  • Chapter 1: August: Pulling a team together
    • It’s not a project
    • Make friends and influence people
    • There’s always a need for a ‘list’ (well, if it’s good enough for Santa Claus!)
    • Project management
    • Chapter summary
  • Chapter 2: September: Street trash
    • Introduction
    • Incompatible software
    • Remote workers
    • User acceptance testing
    • Physical security
    • Password management
    • Laptop management
    • Chapter summary
  • Chapter 3: October: Compliance may be only skin deep
    • Introduction
    • Information security policy
    • Managing corporate antivirus
    • Standard build and image
    • Password management (again)
    • Consumerisation
    • Third-party management
    • Audit log management
    • Vulnerability management
    • Cloud computing
    • Project management
    • Chapter summary
  • Chapter 4: November: How remote is remote?
    • Introduction
    • Location, location, location
    • Innovation, innovation, innovation
    • Information labelling
    • Lessons learnt
    • Chapter summary
  • Chapter 5: December: Oh, for the sake of yet another proposal
    • Security improvement programme
    • Fax management
    • Image build again
    • Physical security findings
    • Physical security solution suggestions
    • Other security tasks for this month
    • Chapter summary
  • Chapter 6: January: A battle won
    • Baking security in
    • Desktop refresh versus consumerisation
    • Incident reporting
    • Data-sharing protocols
    • Linking InfoSec with records management
    • Penetration testing results
    • Back to physical security issues
    • Reduce, reuse, recycle
    • Other security tasks for this month
    • Chapter summary
  • Chapter 7: February: Money doesn’t buy happiness
    • Divide and conquer?
    • Remember the big picture
    • Breadth of technological change
    • Embracing data protection and privacy
    • Other security tasks for this month
    • Chapter summary
  • Chapter 8: March: Slipping through the net
    • The impact of politics
    • Privacy impact assessments
    • Managing a virus outbreak
    • Other information security tasks this month
    • Chapter summary
  • Chapter 9: April: Linking InfoSec with InfoGov
    • A linguistic journey to information governance
    • How did we get here?
    • Other security tasks for this month
    • Chapter summary
  • Chapter 10: May: Politics and management
    • Situational political awareness
    • Language and management challenges
    • Other security tasks for this month
    • Chapter summary
  • Chapter 11: June: What the auditors shouldn’t know
    • Internal audit has history
    • Increasing and varied security incidents
    • Security awareness theme
    • Chapter summary
  • Chapter 12: July: Journey’s end… and conclusion
    • Returning to the lessons learnt
    • The life of an information security manager
    • Things I haven’t spent a lot of time on
    • Closing thoughts
    • And finally, be an active professional
  • Appendix 1: Security Awareness Themes
  • Appendix 2: ISM Activities
  • Appendix 3: Resources
  • ITG Resources
User Reviews
Rating