,

Implementing an Information Security Management System

Security Management Based on ISO 27001 Guidelines

Paperback Engels 2019 9781484254127
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

Discover the simple steps to implementing information security standards using ISO 27001, the most popular information security standard across the world. You’ll see how it offers best practices to be followed, including the roles of all the stakeholders at the time of security framework implementation, post-implementation, and during monitoring of the implemented controls. Implementing an Information Security Management System provides implementation guidelines for ISO 27001:2013 to protect your information assets and ensure a safer enterprise environment. 

This book is a step-by-step guide on implementing secure ISMS for your organization. It will change the way you interpret and implement information security in your work area or organization. 
What You Will LearnDiscover information safeguard methodsImplement end-to-end information securityManage risk associated with information securityPrepare for audit with associated roles and responsibilitiesIdentify your information riskProtect your information assetsWho This Book Is For
Security professionals who implement and manage a security framework or security controls within their organization. This book can also be used by developers with a basic knowledge of security concepts to gain a strong understanding of security standards for an enterprise.

Specificaties

ISBN13:9781484254127
Taal:Engels
Bindwijze:paperback
Uitgever:Apress

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

Chapter 1 - Need for information security.-&nbsp;Chapter 2 – Step 1: Assessing Needs and Scope.-&nbsp;Chapter 3 – Step 2: Project kick-off.-&nbsp;Chapter 4 – Step 3: Initial Risk Assessment.-&nbsp;Chapter 5 – Step 4: Risk Management Approach.-&nbsp;Chapter 6 – Step 5: Execution.-&nbsp;Chapter 7 – Step 6: Audit.-&nbsp;Chapter 8 – Step 7: Management Review.-&nbsp;Chapter 9 – Step 8: External Audit / Assessment.-&nbsp;Chapter 10 – Continual Improvement.<div><br></div>

Managementboek Top 100

Rubrieken

    Personen

      Trefwoorden

        Implementing an Information Security Management System