»
The Information Systems Security Officer's Guide
 
 

The Information Systems Security Officer's Guide, 3rd Edition

Establishing and Managing a Cyber Security Program

 
The Information Systems Security Officer's Guide, 3rd Edition,Gerald Kovacich,ISBN9780128021903
 
 
Up to
15%
off
 

  

Butterworth-Heinemann

9780128021903

9780128023792

360

229 X 152

This practical guide presents advice on establishing, managing, and evaluating a successful information protection program in a corporation or government agency, covering everything from effective communication to career guidance for the information security officer working in today’s global marketplace

Print Book + eBook

USD 83.94
USD 139.90

Buy both together and save 40%

Print Book

Paperback

In Stock

Estimated Delivery Time
USD 59.46
USD 69.95

eBook
eBook Overview

EPUB format

PDF format

USD 59.46
USD 69.95
Add to Cart
 
 

Key Features

  • Provides updated chapters that reflect the latest technological changes and advances in countering the latest information security threats and risks and how they relate to corporate security and crime investigation
  • Includes new topics, such as forensics labs and information warfare, as well as how to liaison with attorneys, law enforcement, and other agencies others outside the organization
  • Written in an accessible, easy-to-read style

Description

The Information Systems Security Officer's Guide: Establishing and Managing a Cyber Security Program, Third Edition, provides users with information on how to combat the ever-changing myriad of threats security professionals face. This entirely updated edition presents practical advice on establishing, managing, and evaluating a successful information protection program in a corporation or government agency, covering everything from effective communication to career guidance for the information security officer.

The book outlines how to implement a new plan or evaluate an existing one, and is especially targeted to those who are new to the topic. It is the definitive resource for learning the key characteristics of an effective information systems security officer (ISSO), and paints a comprehensive portrait of an ISSO's duties, their challenges, and working environments, from handling new technologies and threats, to performing information security duties in a national security environment.

Readership

Information Security professionals, Security professionals, Information Security students

Gerald Kovacich

CFE, CPP, CISSP

Dr. Gerald L. Kovacich has more than 40 years of experience in industrial, business and government security, investigations, information systems security, and information warfare, both in the U.S. Government as a special agent, in international corporations, and subsequently as an international consultant and lecturer. He retired as the Information Warfare Technologist, Northrop Grumman Corporation to pursue a career as an international consultant, lecturer and writer.

Affiliations and Expertise

Security consultant, lecturer, and author, Oak Harbor, WA, USA

View additional works by Gerald L. Kovacich

The Information Systems Security Officer's Guide, 3rd Edition

SECTION I: THE WORKING ENVIRONMENT OF THE CYBER SECURITY OFFICER
Chapter 1: Understanding the Past and Present Cyber-Information World Environment
Chapter 2: Understanding the Past and Present Global Business and Management Environment
Chapter 3: An Overview of Related World Views of Cyber Security
Chapter 4: A Glimpse at the History of Technology
Chapter 5: Understanding Today’s Threats in the Cyber Vapor - "War Stories" from the Front Lines

SECTION II: THE DUTIES AND RESPONSIBILITIES OF A CYBER SECURITY OFFICER
Chapter 6: The Cyber Security Officer’s Position, Duties and Responsibilities
Chapter 7: The Cyber Security Strategic, Tactical, and Annual Plans
Chapter 8: Establishing a Cyber Security Program and Cyber Security Organization
Chapter 9: Determining and Establishing Cyber Security Functions
Chapter 10: Establishing a Metrics Management System
Chapter 11: Annual Re-Evaluation and Future Plan
Chapter 12: High Technology Fraud and Other Crimes' Investigative Support

SECTION III: GLOBAL, PROFESSIONAL, AND PERSONAL CHALLENGES OF A CYBER SECURITY OFFICER
Chapter 13: Introduction to Global Information Warfare
Chapter 14: The Cyber Security Officer, and Privacy, Ethical, Liability Issues
Chapter 15: Cyber Security Officer Career Development: Marketing Yourself, Lecturing, and Consulting
Chapter 16: 21st Century Challenges for the Cyber Security Officer

 
 
Free Shipping
Shop with Confidence

Free Shipping around the world
▪ Broad range of products
▪ 30 days return policy
FAQ

Contact Us