Apress

IT Security Management

IT Securiteers - Setting up an IT Security Function

By Alberto Partida , Diego Andina

IT Security Management Cover Image

IT Security Management provides an insight on how to create and stimulate a team of passionate IT security professionals, so called “securiteers”. Their added value to the business is to improve the information security position of organisations.

Full Description

  • ISBN13: 978-9-0481-8881-9
  • 284 Pages
  • User Level: Science
  • Publication Date: June 8, 2010
  • Available eBook Formats: PDF
  • eBook Price: $159.00
Buy eBook Buy Print Book Add to Wishlist
Full Description
IT securiteers - The human and technical dimension working for the organisation. Current corporate governance regulations and international standards lead many organisations, big and small, to the creation of an information technology (IT) security function in their organisational chart or to the acquisition of services from the IT security industry. More often than desired, these teams are only useful for companies’ executives to tick the corresponding box in a certification process, be it ISO, ITIL, PCI, etc. Many IT security teams do not provide business value to their company. They fail to really protect the organisation from the increasing number of threats targeting its information systems. IT Security Management provides an insight into how to create and grow a team of passionate IT security professionals. We will call them “securiteers”. They will add value to the business, improving the information security stance of organisations.
Table of Contents

Table of Contents

  1. 1 Vulnerabilities, Threats and Risks In IT. 2 Security and IT Background. 3 The Team–Individual Contract. 4 What To Do: The IT Security Roadmap. 5 How To Do It: Organise the Work In “Baby Steps”. 6 Team Dynamics: Building A “Human System”. 7 Viral Marketing. 8 Management Support: An Indispensable Ingredient. 9 Social Networking for IT Security Professionals. 10 Present, Future and Beauty of IT Security. Annex 1. Example of an Information Security Test. Annex 2. Security Incident News Example. Annex 3. IT Security Starter Kit. Index of MBA Models Referenced at the End of Every Chapter. References. Index.
Errata

If you think that you've found an error in this book, please let us know about it. You will find any confirmed erratum below, so you can check if your concern has already been addressed.

* Required Fields

No errata are currently published