Information Security Leaders Handbook: How To Be An Effective Information Security Leader By Focusing On Fundamental Models

0 avg rating
( 0 ratings by Goodreads )
 
9781492160366: Information Security Leaders Handbook: How To Be An Effective Information Security Leader By Focusing On Fundamental Models
View all copies of this ISBN edition:
 
 

The information security threat landscape changes frequently as a result of changes in technologies, economic issues, globalization, social activism and hectavism, new political realities, and innovations by plain old criminals who want to steal data for financial benefits. Along with, the role and responsibilities of security professionals, especially the ones in the leadership roles, also change. Instead of playing a catch up game all the time, this book emphasizes focusing on basic principles and techniques. The information security leaders should implement these principles to update their personal knowledge, to safeguard their organization’s information assets and optimize information security cost. After having meetings with many information security leaders in diverse industry sectors, I have realized that there is a set of “fundamental” models that help these leaders run successful and effective information security programs. This book is a summary of these fundamentals. Who are the target audience? If you are an information security professional, whether in a leadership role or aspiring to be a future leader, this book is for you. What is this book about? The objective of this book is to make you successful as information security professional by learning from experience of great leaders in this field. It provides core fundamental models in a concise manner that are easy to read and use in managing information security. Most of the chapters accompany visual mind maps, action items, and other visual tools for easy understanding. How is this book organized? The book covers a set of carefully selected topics. This is to ensure that focus remains on principles that are the most important to the success of a security professional. The topics are arranged in six parts as listed below. 1. Know The Business – List of topics important for understanding and knowing the business. 2. Information Security Strategy – Elements of information security strategy, how to create strategy and put it into practice. 3. Security Operations – Major areas related to running an effective security operations program. 4. Risk Management – How to assess and manage risk. 5. Personal Branding – Creating personal brand and establishing credibility to be effective as information security leader. 6. Appendices – Miscellaneous data points and sources of information. How I Use This Book? I suggest that you read one chapter daily, take actions, set goals, and write those actions and goals on the “Goals and Activity Log” page at the end of each chapter. Next day, read another chapter and write the actions and goals with target dates. As you go along, start reading random chapters and keep on reviewing and updating your actions and goals to measure your progress and success. A Systematic Way of Achieving Excellence The book provides a systematic and measureable way towards excellence in your job. I have gone to great length to limit each topic to two pages or less. Please use the “Goals and Activity Log” page to record your progress and make the best use of your time. While you go along, record your experiences and share them on the book web site. Book Web Site Many detailed mind maps, new articles, and discussions are made available at the book web site http://InfoSecLeadersHandbook.wordpress.com. New content will be added on an ongoing basis and you can actually publish your own mind maps on this web site. I would like this web site to be driven by the community where you can share your experiences, tools, mind maps, and any other information to help the information security leaders. Please register on the web site to receive updates.

"synopsis" may belong to another edition of this title.

Top Search Results from the AbeBooks Marketplace

1.

Rehman, Rafeeq U.
Published by Createspace Independent Pub (2013)
ISBN 10: 1492160369 ISBN 13: 9781492160366
New Quantity Available: > 20
Print on Demand
Seller:
Pbshop
(Wood Dale, IL, U.S.A.)
Rating
[?]

Book Description Createspace Independent Pub, 2013. PAP. Condition: New. New Book. Shipped from US within 10 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # IQ-9781492160366

More information about this seller | Contact this seller

Buy New
US$ 14.61
Convert currency

Add to Basket

Shipping: US$ 3.99
Within U.S.A.
Destination, rates & speeds

2.

Rafeeq U Rehman
Published by CreateSpace Independent Publishing Platform
ISBN 10: 1492160369 ISBN 13: 9781492160366
New Paperback Quantity Available: > 20
Print on Demand
Seller:
BuySomeBooks
(Las Vegas, NV, U.S.A.)
Rating
[?]

Book Description CreateSpace Independent Publishing Platform. Paperback. Condition: New. This item is printed on demand. 150 pages. Dimensions: 8.9in. x 5.9in. x 0.5in.The information security threat landscape changes frequently as a result of changes in technologies, economic issues, globalization, social activism and hectavism, new political realities, and innovations by plain old criminals who want to steal data for financial benefits. Along with, the role and responsibilities of security professionals, especially the ones in the leadership roles, also change. Instead of playing a catch up game all the time, this book emphasizes focusing on basic principles and techniques. The information security leaders should implement these principles to update their personal knowledge, to safeguard their organizations information assets and optimize information security cost. After having meetings with many information security leaders in diverse industry sectors, I have realized that there is a set of fundamental models that help these leaders run successful and effective information security programs. This book is a summary of these fundamentals. Who are the target audience If you are an information security professional, whether in a leadership role or aspiring to be a future leader, this book is for you. What is this book about The objective of this book is to make you successful as information security professional by learning from experience of great leaders in this field. It provides core fundamental models in a concise manner that are easy to read and use in managing information security. Most of the chapters accompany visual mind maps, action items, and other visual tools for easy understanding. How is this book organized The book covers a set of carefully selected topics. This is to ensure that focus remains on principles that are the most important to the success of a security professional. The topics are arranged in six parts as listed below. 1. Know The Business List of topics important for understanding and knowing the business. 2. Information Security Strategy Elements of information security strategy, how to create strategy and put it into practice. 3. Security Operations Major areas related to running an effective security operations program. 4. Risk Management How to assess and manage risk. 5. Personal Branding Creating personal brand and establishing credibility to be effective as information security leader. 6. Appendices Miscellaneous data points and sources of information. How I Use This Book I suggest that you read one chapter daily, take actions, set goals, and write those actions and goals on the Goals and Activity Log page at the end of each chapter. Next day, read another chapter and write the actions and goals with target dates. As you go along, start reading random chapters and keep on reviewing and updating your actions and goals to measure your progress and success. A Systematic Way of Achieving Excellence The book provides a systematic and measureable way towards excellence in your job. I have gone to great length to limit each topic to two pages or less. Please use the Goals and Activity Log page to record your progress and make the best use of your time. While you go along, record your experiences and share them on the book web site. Book Web Site Many detailed mind maps, new articles, and discussions are made available at the book web site http: InfoSecLeadersHandbook. wordpress. com. New content will be added on an ongoing basis and you can actually publish your own mind maps on this web site. I would like this web site to be driven by the community where you can share your experiences, tools, mind maps, and any other information to help the information security leaders. Please register on the web site to receive updates. This item ships from La Vergne,TN. Paperback. Seller Inventory # 9781492160366

More information about this seller | Contact this seller

Buy New
US$ 25.35
Convert currency

Add to Basket

Shipping: FREE
Within U.S.A.
Destination, rates & speeds

3.

Rehman, Rafeeq U.
Published by Createspace Independent Pub (2013)
ISBN 10: 1492160369 ISBN 13: 9781492160366
New Quantity Available: > 20
Print on Demand
Seller:
Books2Anywhere
(Fairford, GLOS, United Kingdom)
Rating
[?]

Book Description Createspace Independent Pub, 2013. PAP. Condition: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # IQ-9781492160366

More information about this seller | Contact this seller

Buy New
US$ 18.20
Convert currency

Add to Basket

Shipping: US$ 11.85
From United Kingdom to U.S.A.
Destination, rates & speeds

4.

Rafeeq U Rehman
Published by CreateSpace Independent Publishing Platform (2013)
ISBN 10: 1492160369 ISBN 13: 9781492160366
New Softcover Quantity Available: 1
Seller:
Irish Booksellers
(Portland, ME, U.S.A.)
Rating
[?]

Book Description CreateSpace Independent Publishing Platform, 2013. Condition: New. book. Seller Inventory # M1492160369

More information about this seller | Contact this seller

Buy New
US$ 29.36
Convert currency

Add to Basket

Shipping: US$ 3.27
Within U.S.A.
Destination, rates & speeds