Sabtu, 23 November 2013

[K136.Ebook] Get Free Ebook Security Program and Policies: Principles and Practices (2nd Edition) (Certification/Training), by Sari Greene

Get Free Ebook Security Program and Policies: Principles and Practices (2nd Edition) (Certification/Training), by Sari Greene

Be the initial to purchase this book now and obtain all factors why you have to review this Security Program And Policies: Principles And Practices (2nd Edition) (Certification/Training), By Sari Greene The publication Security Program And Policies: Principles And Practices (2nd Edition) (Certification/Training), By Sari Greene is not just for your duties or requirement in your life. Publications will certainly constantly be a buddy in each time you read. Now, allow the others learn about this page. You can take the perks as well as discuss it likewise for your friends and also individuals around you. By by doing this, you can actually obtain the definition of this book Security Program And Policies: Principles And Practices (2nd Edition) (Certification/Training), By Sari Greene beneficially. Exactly what do you think of our concept below?

Security Program and Policies: Principles and Practices (2nd Edition) (Certification/Training), by Sari Greene

Security Program and Policies: Principles and Practices (2nd Edition) (Certification/Training), by Sari Greene



Security Program and Policies: Principles and Practices (2nd Edition) (Certification/Training), by Sari Greene

Get Free Ebook Security Program and Policies: Principles and Practices (2nd Edition) (Certification/Training), by Sari Greene

Some people might be giggling when checking out you checking out Security Program And Policies: Principles And Practices (2nd Edition) (Certification/Training), By Sari Greene in your leisure. Some could be appreciated of you. As well as some may want be like you who have reading leisure activity. What regarding your personal feel? Have you really felt right? Checking out Security Program And Policies: Principles And Practices (2nd Edition) (Certification/Training), By Sari Greene is a requirement as well as a hobby simultaneously. This condition is the on that particular will make you really feel that you should check out. If you understand are seeking the book entitled Security Program And Policies: Principles And Practices (2nd Edition) (Certification/Training), By Sari Greene as the option of reading, you could find here.

Why must be this book Security Program And Policies: Principles And Practices (2nd Edition) (Certification/Training), By Sari Greene to read? You will never get the knowledge and encounter without getting by yourself there or attempting by yourself to do it. For this reason, reading this e-book Security Program And Policies: Principles And Practices (2nd Edition) (Certification/Training), By Sari Greene is needed. You could be great as well as proper enough to obtain how vital is reviewing this Security Program And Policies: Principles And Practices (2nd Edition) (Certification/Training), By Sari Greene Even you constantly read by obligation, you can support yourself to have reading publication routine. It will certainly be so useful as well as enjoyable after that.

Yet, exactly how is the means to obtain this publication Security Program And Policies: Principles And Practices (2nd Edition) (Certification/Training), By Sari Greene Still puzzled? It does not matter. You could appreciate reading this e-book Security Program And Policies: Principles And Practices (2nd Edition) (Certification/Training), By Sari Greene by on the internet or soft data. Simply download and install guide Security Program And Policies: Principles And Practices (2nd Edition) (Certification/Training), By Sari Greene in the web link given to check out. You will obtain this Security Program And Policies: Principles And Practices (2nd Edition) (Certification/Training), By Sari Greene by online. After downloading and install, you can conserve the soft file in your computer system or gadget. So, it will relieve you to review this book Security Program And Policies: Principles And Practices (2nd Edition) (Certification/Training), By Sari Greene in particular time or location. It may be not exactly sure to appreciate reviewing this e-book Security Program And Policies: Principles And Practices (2nd Edition) (Certification/Training), By Sari Greene, considering that you have bunches of job. Yet, with this soft documents, you could delight in reviewing in the extra time also in the spaces of your tasks in workplace.

Again, reading behavior will constantly provide helpful perks for you. You might not require to invest often times to read the e-book Security Program And Policies: Principles And Practices (2nd Edition) (Certification/Training), By Sari Greene Merely alloted a number of times in our extra or downtimes while having meal or in your workplace to read. This Security Program And Policies: Principles And Practices (2nd Edition) (Certification/Training), By Sari Greene will certainly show you new point that you could do now. It will certainly assist you to enhance the high quality of your life. Event it is merely a fun book Security Program And Policies: Principles And Practices (2nd Edition) (Certification/Training), By Sari Greene, you can be healthier as well as a lot more fun to take pleasure in reading.

Security Program and Policies: Principles and Practices (2nd Edition) (Certification/Training), by Sari Greene

Everything you need to know about information security programs and policies, in one book

  • Clearly explains all facets of InfoSec program and policy planning, development, deployment, and management
  • Thoroughly updated for today’s challenges, laws, regulations, and best practices
  • The perfect resource for anyone pursuing an information security management career

In today’s dangerous world, failures in information security can be catastrophic. Organizations must protect themselves. Protection begins with comprehensive, realistic policies. This up-to-date guide will help you create, deploy, and manage them.

Complete and easy to understand, it explains key concepts and techniques through real-life examples. You’ll master modern information security regulations and frameworks, and learn specific best-practice policies for key industry sectors, including finance, healthcare, online commerce, and small business.

If you understand basic information security, you’re ready to succeed with this book. You’ll find projects, questions, exercises, examples, links to valuable easy-to-adapt information security policies...everything you need to implement a successful information security program.

Sari Stern Greene, CISSP, CRISC, CISM, NSA/IAM, is an information security practitioner, author, and entrepreneur. She is passionate about the importance of protecting information and critical infrastructure. Sari founded Sage Data Security in 2002 and has amassed thousands of hours in the field working with a spectrum of technical, operational, and management personnel, as� well as boards of directors, regulators, and service providers. Her first text was Tools and Techniques for Securing Microsoft Networks, commissioned by Microsoft to train its partner channel, which was soon followed by the first edition of Security Policies and Procedures: Principles and Practices. She is actively involved in the security community, and speaks regularly at security conferences and workshops. She has been quoted in The New York Times, Wall Street Journal, and on CNN, and CNBC. Since 2010, Sari has served as the chair of the annual Cybercrime Symposium.

Learn how to

��������� Establish program objectives, elements, domains, and governance

��������� Understand policies, standards, procedures, guidelines, and plans—and the differences among them

��������� Write policies in “plain language,” with the right level of detail

��������� Apply the Confidentiality, Integrity & Availability (CIA) security model

��������� Use NIST resources and ISO/IEC 27000-series standards

��������� Align security with business strategy

��������� Define, inventory, and classify your information and systems

��������� Systematically identify, prioritize, and manage InfoSec risks

��������� Reduce “people-related” risks with role-based Security Education, Awareness, and Training (SETA)

��������� Implement effective physical, environmental, communications, and operational security

��������� Effectively manage access control

��������� Secure the entire system development lifecycle

��������� Respond to incidents and ensure continuity of operations

��������� Comply with laws and regulations, including GLBA, HIPAA/HITECH, FISMA, state data security and notification rules, and PCI DSS

  • Sales Rank: #267147 in Books
  • Brand: Brand: Pearson IT Certification
  • Published on: 2014-03-29
  • Original language: English
  • Number of items: 1
  • Dimensions: 8.90" h x 1.50" w x 6.90" l, 2.19 pounds
  • Binding: Paperback
  • 648 pages
Features
  • Used Book in Good Condition

About the Author

Sari Greene is an information security practitioner, author, and entrepreneur. She founded Sage Data Security in 2002 and has amassed thousands of hours in the field working with a spectrum of technical, operational, and management personnel as well as board of directors, regulators, and service providers. Sari provided expert witness testimony in the groundbreaking PATCO v. Ocean National Bank case. From 2006 through 2010, she served as the managing director for the MEAPC, a coalition of 24 financial institutions that embrace a mission of preventing information theft and fraud through public education and awareness. Since 2010, she has served as the chair of the annual Cybercrime Symposium held in Portsmouth, New Hampshire. Sari’s first text was Tools and Techniques for Securing Microsoft Networks, commissioned by Microsoft to train its partner channel, followed soon after by the first edition of Security Policies and Procedures: Principles and Practices. She has published a number of articles and whitepapers related to information security and has been quoted in The New York Times, Wall Street Journal, CNN, and on CNBC. She speaks regularly at security conferences and workshops around the country and is a frequent guest lecturer. Sari has an MBA from the University of New Hampshire system and has earned an array of government and industry certifications and accreditations, including ISACA Certification in Risk and Information Systems Control (CRISC), ISACA Certification in Security Management (CISM), ISC2 Certification in Information Systems Security (CISSP), and Microsoft Certified Network Engineer (MCSE), and is certified by the National Security Agency to conduct NSA-IAM assessments for federal government agencies and contractors. You can contact Sari at sari@sarigreene.com or follow her on Twitter @sari_greene.

Most helpful customer reviews

1 of 1 people found the following review helpful.
The book is foundation and framework level which means you won't find tips on using better passwords. What you will find is what
By Bob Monroe
There are hundreds of books and articles available on the topic of digital security. Of those, many are devoted to helping the reader pass an exam for a certification such as the CISSP or Security+. The problem is that once you get that job with your certification, how do you actually perform the tasks of being a cyber security professional? Security Program and Policies by Sari Stern Greene is that one book written to provide the higher level security fundamentals.

First off, this book is not written for the average security professional because very few people will work at this high view. The book is foundation and framework level which means you won't find tips on using better passwords. What you will find is what CISO's deal with on a daily basis: policy and practices of organizational security principles.

The author establishes two frameworks for security foundations for the reader to adopt: the first is ISO 27002 and the second is NIST otherwise known as DIACAP or Defense in Depth. If you don't know what either of those mean, don't worry about it because they are explained in sufficient detail throughout the book. ISO is an international standard while NIST is a United States based security framework. ISO requires purchase of their documents and adherence to that framework with your organizations ability to pass a series of audits. NIST is free and unless you are working for the U.S. federal government, participation is optional (but highly recommended).

Both frameworks aim for the same target but take different paths to reach that goal. It is important to choice one or the other early on in your organizations security development because each require major investments of time and resources. Security Program and Policies highlights each difference and why or how these standards will influence your security investments. Obtaining compliance with either framework is not a one-time event but rather a road that your security program will travel on.

What I loved about this book is that Mrs. Greene writes exactly how I have felt about cyber security. She nails the need for security compliance buy-in from upper management. What good is a program if the CEO is allowed to bypass control measures but expects every employee to follow the letter of the law? This has happened several times in the past where a major company has allowed their upper management to circumvent password or email security requirements only to fall prey to an attack with the highest person in the food chain.

There is a major shortfall in employee security education across the board. Everyone in your organization must be trained and continued to be educated on cyber security. This is not a one-time event either. Your training program must be a cycle that reaches everyone, including subcontractors and outside vendors who may have access to your network. The CEO is not allowed to pass on that training but should set the example for all employees to follow. The security policies need to influence everyone, not just the worker-bees.

All too often you'll find the older managers standing on the back of the room with their arms folded waiting to leave as soon as the training begins. This is where breaches occur as many attackers will target upper management for their attacks. Mrs. Greene goes deep into FIPS and other government regulations. The reasons for this is because these documents are written by some very smart people who know what they are talking about. If the information and techniques are good enough to protect the U.S. Department of Defense, they ought to be good enough for your company. The sooner you realize this the better off you will be. Security is not a game and Mrs. Greene lays out many excellent resources to help you organize your network security.
One of the many reasons why I loved this book is because the author dissects other security standards and laws such as HIPAA, PCI Data Security Standard Framework and Gramm-Leach-Bliley Act. The book also covers all the gaps in those certification study guides like PCI DSS compliance requirements, examples of writing an SOP and locations to find educational resources.

I guess my favorite part of this book is the overall writing style Mrs. Greene has taken up. Her audience is a small segment of upper level security professionals, which she uses as a sounding board for her years of observations. She lays out many of the exact same issues I've seen and pounded my head against the wall all these years. The author gives excellent reasons to stop this hypocrisy and look at proven solutions for better security. When the CEO of a soda manufacturing company visits a malicious web site for solar panels, that person needs to be held to same or higher standards as every employee in that company. That breach went on for two years.

So much for secret formulas.

Security Program and Policies by Sari Stern Greene is a tool for crafting a cyber security program in a mid to large company. For some reason, the author decided to add a few questions at the end of each chapter. I assume the purpose is to check your learning or see if you were paying attention. My own opinion is that you would not pick this book up unless you intended to dig deep into CISO level duties. This is not light reading or something you read for brushing up on your certification skills.

Mrs. Greene literally wrote the law in this book (chapter 14). I suggest you grab a copy if you plan on moving up in the world of cyber security. A good portion of Security Program and Policies is equivalent to a masters degree. If you plan on pursuing a higher level of education in Information Security, you will need this book, too. I wish I had it back then.

2 of 3 people found the following review helpful.
A FANTASTIC UP TO DATE GUIDE ON INFORMATION SECURITY!!
By COSMIC TRAVELER
Are you an information security professional? If you are, then this book is for you! Author Sari Greene, has done an outstanding job of writing a second edition of a book that references the ISO 27002:2013.

Author Greene, begins by exploring policies from an historical perspective, talks about how humankind has been affected, and shows you how societies have evolved, by using policies to establish order and protect people and resources. Then, the author introduces you to plain language: Which means using the simplest, most straightforward way to express an idea. She continues by focusing on information security objectives and framework, which will help you answer questions that relate to the need to maintain secure communications among and between government, public and private sectors. Then, the author discusses why risk management is a fundamental aspect of governance, decision making and policy. She then looks at the various methods and rating methodologies that organizations use to define, inventory, and classify information and information systems. Next, the author examines the security issues associated with employee recruitment, onboarding, user provisioning, career development, and termination. She continues by focusing on design, obstacles, monitoring, and response, as they relate to secure areas, equipment security, and environmental controls. Then, the author covers policies, processes, and procedures that are recommended to create and maintain a secure operational environment. Next, she shows you how to develop policies that are designed to support user access and productivity, while simultaneously mitigating the risk of unauthorized access. The author also examines why cryptographic protection mechanisms are closely related to information systems development and maintenance. She continues by showing you how to prepare for an information security incident. Then, the author explains the components of a business continuity plan and program. Next, she examines the regulations that are applicable to the financial sector. The author also examines the components of the original HIPAA Security Rule, the HITECH Act, and the omnibus Rule. Finally, she looks at the PCI DSS, version 3.0.

This most excellent book helps you articulate the objective of information security-related policies. In fact, this great book will help you define the lifecycle of an information security policy.

0 of 0 people found the following review helpful.
Perfect for people pursuing a career in information security
By Joseph M Johnston
Written in plain English, this book has almost anything an aspiring information security manager needs to know. Should be required reading for 101 level college classes.

See all 7 customer reviews...

Security Program and Policies: Principles and Practices (2nd Edition) (Certification/Training), by Sari Greene PDF
Security Program and Policies: Principles and Practices (2nd Edition) (Certification/Training), by Sari Greene EPub
Security Program and Policies: Principles and Practices (2nd Edition) (Certification/Training), by Sari Greene Doc
Security Program and Policies: Principles and Practices (2nd Edition) (Certification/Training), by Sari Greene iBooks
Security Program and Policies: Principles and Practices (2nd Edition) (Certification/Training), by Sari Greene rtf
Security Program and Policies: Principles and Practices (2nd Edition) (Certification/Training), by Sari Greene Mobipocket
Security Program and Policies: Principles and Practices (2nd Edition) (Certification/Training), by Sari Greene Kindle

Security Program and Policies: Principles and Practices (2nd Edition) (Certification/Training), by Sari Greene PDF

Security Program and Policies: Principles and Practices (2nd Edition) (Certification/Training), by Sari Greene PDF

Security Program and Policies: Principles and Practices (2nd Edition) (Certification/Training), by Sari Greene PDF
Security Program and Policies: Principles and Practices (2nd Edition) (Certification/Training), by Sari Greene PDF

Tidak ada komentar:

Posting Komentar