Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
|
Buy Now
Managing Risk and Information Security - Protect to Enable (Paperback, 2nd ed.)
Loot Price: R1,677
Discovery Miles 16 770
|
|
Managing Risk and Information Security - Protect to Enable (Paperback, 2nd ed.)
Expected to ship within 10 - 15 working days
|
Examine the evolving enterprise security landscape and discover how
to manage and survive risk. While based primarily on the author's
experience and insights at major companies where he has served as
CISO and CSPO, the book also includes many examples from other
well-known companies and provides guidance for a management-level
audience. Managing Risk and Information Security provides thought
leadership in the increasingly important area of enterprise
information risk and security. It describes the changing risk
environment and why a fresh approach to information security is
needed. Because almost every aspect of an enterprise is now
dependent on technology not only for internal operations but
increasing as a part of product or service creation, the focus of
IT security must shift from locking down assets to enabling the
business while managing and surviving risk. This edition discusses
business risk from a broader perspective, including privacy and
regulatory considerations. It describes the increasing number of
threats and vulnerabilities and offers strategies for developing
solutions. These include discussions of how enterprises can take
advantage of new and emerging technologies-such as social media and
the huge proliferation of Internet-enabled devices-while minimizing
risk. What You'll Learn Review how people perceive risk and the
effects it has on information security See why different
perceptions of risk within an organization matters Understand and
reconcile these differing risk views Gain insights into how to
safely enable the use of new technologies Who This Book Is ForThe
primary audience is CIOs and other IT leaders, CISOs and other
information security leaders, IT auditors, and other leaders of
corporate governance and risk functions. The secondary audience is
CEOs, board members, privacy professionals, and less senior-level
information security and risk professionals. "Harkins' logical,
methodical approach as a CISO to solving the most complex
cybersecurity problems is reflected in the lucid style of this
book. His enlightened approach to intelligence-based security
infrastructure and risk mitigation is our best path forward if we
are ever to realize the vast potential of the innovative digital
world we are creating while reducing the threats to manageable
levels. The author shines a light on that path in a comprehensive
yet very readable way." -Art Coviello, Former CEO and Executive
Chairman, RSA
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
You might also like..
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.