PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES
Save time and money! Order your required bundles and access codes at www.shopjblearning.com!
Security Policies and Implementation Issues, Second Edition offers a comprehensive, end-to-end view of information security policies and frameworks from the raw organizational mechanics of building to the psychology of implementation. Written by an industry expert, it presents an effective balance between technical knowledge and soft skills, and introduces many different concepts of information security in clear simple terms such as governance, regulator mandates, business drivers, legal considerations, and much more. With step-by-step examples and real-world exercises, this book is a must-have resource for students, security officers, auditors, and risk leaders looking to fully understand the process of implementing successful sets of security policies and frameworks.
Instructor Materials for Security Policies and Implementation Issues, Second Edition include:
PowerPoint Lecture Slides
Sample Course Syllabus
Quiz & Exam Questions
About the Series
This book is part of the Information Systems Security and Assurance Series from Jones and Bartlett Learning. Designed for courses and curriculums in IT Security, Cybersecurity, Information Assurance, and Information Systems Security, this series features a comprehensive, consistent treatment of the most current thinking and trends in this critical subject area. These titles deliver fundamental information-security principles packed with real-world applications and examples. Authored by Certified Information Systems Security Professionals (CISSPs), they deliver comprehensive information on all aspects of information security. Reviewed word for word by leading technical experts in the field, these books are not just current, but forward-thinking—putting you in the position to solve the cybersecurity challenges not just of today, but of tomorrow, as well.
Written for IT students and professionals hoping to gain knowledge in security policies and information security systems.
Chapter 1: Governance and Information Security Policy Management
Chapter 2: Business Drivers for Information Security Policies
Chapter 3: U.S. Compliance Laws and Information Security Policy Requirements
Chapter 4: Business Challenges Within the Seven Domains of IT Responsibility
Chapter 5: Information Security Policy Implementation Issues
Chapter 6: IT Security Policy Frameworks
Chapter 7: How to Design, Organize, Implement, and Maintain IT Security Policies
Chapter 8: IT Security Policy Framework Approaches
Chapter 9: User Domain Policies
Chapter 10: IT Infrastructure Security Policies
Chapter 11: Data Classification and Handling Policies and Risk Management Policies
Chapter 12: Incident Response Team (IRT) Policies
Chapter 13: IT Security Policy Implementations
Chapter 14: IT Security Policy Enforcement
Chapter 15: IT Policy Compliance Systems and Emerging Technologies
Robert Johnson (CISA, CGEIT, CISM, CISSP) has 20 years experience dealing with all aspects of information security, IT audit, risk management, and privacy compliance. His diverse background includes hands-on operational experience as well as providing strategic risk assessment and scoring for leadership and board-level audiences. Currently he works in the security risk management division of a large financial services insurance company. Previously he worked as a first vice president and IT audit and security advisory director at Washington Mutual (JP Morgan Chase).
Additional Titles by this Author
- ISBN-13: 9781284064766
- ISBN-13: 9781284059168