Home > Store

Security Program and Policies: Principles and Practices, Rough Cuts, 2nd Edition

Rough Cuts

  • Available to Safari Subscribers
  • About Rough Cuts
  • Rough Cuts are manuscripts that are developed but not yet published, available through Safari. Rough Cuts provide you access to the very latest information on a given topic and offer you the opportunity to interact with the author to influence the final publication.

Not for Sale

Description

  • Copyright 2014
  • Dimensions: 7-1/2" x 9-1/8"
  • Pages: 648
  • Edition: 2nd
  • Rough Cuts
  • ISBN-10: 0-13-348120-4
  • ISBN-13: 978-0-13-348120-4

This is the Rough Cut version of the printed book.

Everything you need to know about information security programs and policies, in one book

  • Clearly explains all facets of InfoSec program and policy planning, development, deployment, and management
  • Thoroughly updated for today’s challenges, laws, regulations, and best practices
  • The perfect resource for anyone pursuing an information security management career

In today’s dangerous world, failures in information security can be catastrophic. Organizations must protect themselves. Protection begins with comprehensive, realistic policies. This up-to-date guide will help you create, deploy, and manage them.

Complete and easy to understand, it explains key concepts and techniques through real-life examples. You’ll master modern information security regulations and frameworks, and learn specific best-practice policies for key industry sectors, including finance, healthcare, online commerce, and small business.

If you understand basic information security, you’re ready to succeed with this book. You’ll find projects, questions, exercises, examples, links to valuable easy-to-adapt information security policies...everything you need to implement a successful information security program.

Sari Stern Greene, CISSP, CRISC, CISM, NSA/IAM, is an information security practitioner, author, and entrepreneur. She is passionate about the importance of protecting information and critical infrastructure. Sari founded Sage Data Security in 2002 and has amassed thousands of hours in the field working with a spectrum of technical, operational, and management personnel, as  well as boards of directors, regulators, and service providers. Her first text was Tools and Techniques for Securing Microsoft Networks, commissioned by Microsoft to train its partner channel, which was soon followed by the first edition of Security Policies and Procedures: Principles and Practices. She is actively involved in the security community, and speaks regularly at security conferences and workshops. She has been quoted in The New York Times, Wall Street Journal, and on CNN, and CNBC. Since 2010, Sari has served as the chair of the annual Cybercrime Symposium.

Learn how to

·         Establish program objectives, elements, domains, and governance

·         Understand policies, standards, procedures, guidelines, and plans—and the differences among them

·         Write policies in “plain language,” with the right level of detail

·         Apply the Confidentiality, Integrity & Availability (CIA) security model

·         Use NIST resources and ISO/IEC 27000-series standards

·         Align security with business strategy

·         Define, inventory, and classify your information and systems

·         Systematically identify, prioritize, and manage InfoSec risks

·         Reduce “people-related” risk

Sample Content

Table of Contents

Chapter 1: Understanding Policy 2

Looking at Policy Through the Ages....................................................................3

    The Bible as Ancient Policy ........................................................................4

    The United States Constitution as a Policy Revolution ..............................5

    Policy Today ...............................................................................................5

Information Security Policy ..................................................................................7

    Successful Policy Characteristics ...............................................................8

    The Role of Government ...........................................................................13

Information Security Policy Lifecycle ................................................................16

    Policy Development ..................................................................................17

    Policy Publication .....................................................................................18

    Policy Adoption .........................................................................................19

    Policy Review ............................................................................................20

Test Your Skills ..................................................................................................22

Chapter 2: Policy Elements and Style 32

Policy Hierarchy .................................................................................................32

    Standards..................................................................................................33

    Baselines ...................................................................................................34

    Guidelines .................................................................................................34

    Procedures ................................................................................................35

    Plans and Programs..................................................................................36

Policy Format .....................................................................................................36

    Policy Audience ..................

Updates

Submit Errata

More Information