0
Your cart

Your cart is empty

Books > Computing & IT > Computer hardware & operating systems > Systems management

Buy Now

Securing an IT Organization through Governance, Risk Management, and Audit (Hardcover) Loot Price: R2,195
Discovery Miles 21 950
Securing an IT Organization through Governance, Risk Management, and Audit (Hardcover): Ken E. Sigler, James L. Rainey, III

Securing an IT Organization through Governance, Risk Management, and Audit (Hardcover)

Ken E. Sigler, James L. Rainey, III

Series: Internal Audit and IT Audit

 (sign in to rate)
Loot Price R2,195 Discovery Miles 21 950 | Repayment Terms: R206 pm x 12*

Bookmark and Share

Expected to ship within 12 - 17 working days

Donate to Against Period Poverty

Past events have shed light on the vulnerability of mission-critical computer systems at highly sensitive levels. It has been demonstrated that common hackers can use tools and techniques downloaded from the Internet to attack government and commercial information systems. Although threats may come from mischief makers and pranksters, they are more likely to result from hackers working in concert for profit, hackers working under the protection of nation states, or malicious insiders. Securing an IT Organization through Governance, Risk Management, and Audit introduces two internationally recognized bodies of knowledge: Control Objectives for Information and Related Technology (COBIT 5) from a cybersecurity perspective and the NIST Framework for Improving Critical Infrastructure Cybersecurity (CSF). Emphasizing the processes directly related to governance, risk management, and audit, the book provides details of a cybersecurity framework (CSF), mapping each of the CSF steps and activities to the methods defined in COBIT 5. This method leverages operational risk understanding in a business context, allowing the information and communications technology (ICT) organization to convert high-level enterprise goals into manageable, specific goals rather than unintegrated checklist models. The real value of this methodology is to reduce the knowledge fog that frequently engulfs senior business management, and results in the false conclusion that overseeing security controls for information systems is not a leadership role or responsibility but a technical management task. By carefully reading, implementing, and practicing the techniques and methodologies outlined in this book, you can successfully implement a plan that increases security and lowers risk for you and your organization.

General

Imprint: Productivity Press
Country of origin: United States
Series: Internal Audit and IT Audit
Release date: 2016
Authors: Ken E. Sigler • James L. Rainey, III
Dimensions: 234 x 156 x 26mm (L x W x T)
Format: Hardcover
Pages: 396
ISBN-13: 978-1-4987-3731-9
Categories: Books > Computing & IT > Computer hardware & operating systems > Systems management
Books > Computing & IT > Computer communications & networking > Network security
Books > Business & Economics > Business & management > Management of specific areas > General
Books > Computing & IT > Computer software packages > Other software packages > Accounting software
LSN: 1-4987-3731-5
Barcode: 9781498737319

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

Partners