Michael Gentile, Ronald D. Collette, Thomas D. August.
Boca Raton :
Auerbach Publications,
2006.
1 online resource (xxiii, 322 pages) :
illustrations
Includes bibliographical references (pages 313-314) and index.
1. Assess -- 2. Plan -- 3. Design -- 4. Execute -- 5. Report -- 6. The final phase.
0
The Chief Security Officer helps readers understand the emerging phenomenon of a position that combines the traditional security manager with one who protects information. It explains why a chief security officer is important and how security needs to be implemented in terms of identifying risk, developing a corporate policy, and implementing unified strategy for the protection of people, facilities, and information. This non-technical book examines risks associated with a lack of security and explains how to build a structure for examining and building unified security. The author reviews req.
Ingram Content Group
TANDF_183211
CISO handbook.
0849319528
Computer security.
Data protection.
Electronic data processing departments-- Security measures.
BUSINESS & ECONOMICS-- Corporate Governance.
BUSINESS & ECONOMICS-- Leadership.
BUSINESS & ECONOMICS-- Organizational Development.
BUSINESS & ECONOMICS-- Workplace Culture.
Computer security.
Data protection.
Electronic data processing departments-- Security measures.