Information Security Leaders Handbook: How To Be An Effective Information Security Leader By Focusing On Fundamental Models
暫譯: 資訊安全領導者手冊:如何專注於基本模型成為有效的資訊安全領導者

Rafeeq U Rehman

  • 出版商: CreateSpace Independ
  • 出版日期: 2013-08-24
  • 售價: $910
  • 貴賓價: 9.5$865
  • 語言: 英文
  • 頁數: 150
  • 裝訂: Paperback
  • ISBN: 1492160369
  • ISBN-13: 9781492160366
  • 相關分類: 資訊安全
  • 海外代購書籍(需單獨結帳)

相關主題

商品描述

The information security threat landscape changes frequently as a result of changes in technologies, economic issues, globalization, social activism and hectavism, new political realities, and innovations by plain old criminals who want to steal data for financial benefits. Along with, the role and responsibilities of security professionals, especially the ones in the leadership roles, also change. Instead of playing a catch up game all the time, this book emphasizes focusing on basic principles and techniques. The information security leaders should implement these principles to update their personal knowledge, to safeguard their organization’s information assets and optimize information security cost. After having meetings with many information security leaders in diverse industry sectors, I have realized that there is a set of “fundamental” models that help these leaders run successful and effective information security programs. This book is a summary of these fundamentals. Who are the target audience? If you are an information security professional, whether in a leadership role or aspiring to be a future leader, this book is for you. What is this book about? The objective of this book is to make you successful as information security professional by learning from experience of great leaders in this field. It provides core fundamental models in a concise manner that are easy to read and use in managing information security. Most of the chapters accompany visual mind maps, action items, and other visual tools for easy understanding. How is this book organized? The book covers a set of carefully selected topics. This is to ensure that focus remains on principles that are the most important to the success of a security professional. The topics are arranged in six parts as listed below. 1. Know The Business – List of topics important for understanding and knowing the business. 2. Information Security Strategy – Elements of information security strategy, how to create strategy and put it into practice. 3. Security Operations – Major areas related to running an effective security operations program. 4. Risk Management – How to assess and manage risk. 5. Personal Branding – Creating personal brand and establishing credibility to be effective as information security leader. 6. Appendices – Miscellaneous data points and sources of information. How I Use This Book? I suggest that you read one chapter daily, take actions, set goals, and write those actions and goals on the “Goals and Activity Log” page at the end of each chapter. Next day, read another chapter and write the actions and goals with target dates. As you go along, start reading random chapters and keep on reviewing and updating your actions and goals to measure your progress and success. A Systematic Way of Achieving Excellence The book provides a systematic and measureable way towards excellence in your job. I have gone to great length to limit each topic to two pages or less. Please use the “Goals and Activity Log” page to record your progress and make the best use of your time. While you go along, record your experiences and share them on the book web site. Book Web Site Many detailed mind maps, new articles, and discussions are made available at the book web site http://InfoSecLeadersHandbook.wordpress.com. New content will be added on an ongoing basis and you can actually publish your own mind maps on this web site. I would like this web site to be driven by the community where you can share your experiences, tools, mind maps, and any other information to help the information security leaders. Please register on the web site to receive updates.

商品描述(中文翻譯)

資訊安全威脅的環境因技術變化、經濟問題、全球化、社會運動和激進主義、新的政治現實,以及那些想要竊取數據以獲取財務利益的普通罪犯的創新而頻繁變化。隨著這些變化,安全專業人員的角色和責任,特別是領導角色的專業人員,也隨之改變。本書強調專注於基本原則和技術,而不是一直在追趕的遊戲。資訊安全領導者應該實施這些原則,以更新他們的個人知識,保護組織的資訊資產並優化資訊安全成本。在與許多來自不同產業領域的資訊安全領導者會議後,我意識到有一套“基本”模型可以幫助這些領導者成功運行有效的資訊安全計劃。本書是這些基本原則的總結。

目標讀者是誰?如果您是一位資訊安全專業人員,無論是處於領導角色還是渴望成為未來的領導者,本書都適合您。

本書的內容是什麼?本書的目標是通過學習這個領域偉大領導者的經驗,使您作為資訊安全專業人員獲得成功。它以簡明的方式提供核心基本模型,易於閱讀和在管理資訊安全中使用。大多數章節附有視覺思維導圖、行動項目和其他視覺工具,以便於理解。

本書的組織方式是什麼?本書涵蓋了一組精心挑選的主題,以確保重點保持在對安全專業人員成功最重要的原則上。這些主題分為六個部分,如下所示:
1. 瞭解業務 – 重要的主題列表,以便理解和認識業務。
2. 資訊安全策略 – 資訊安全策略的要素,如何創建策略並付諸實踐。
3. 安全運營 – 與運行有效的安全運營計劃相關的主要領域。
4. 風險管理 – 如何評估和管理風險。
5. 個人品牌 – 創建個人品牌並建立可信度,以便作為資訊安全領導者有效。
6. 附錄 – 各種數據點和資訊來源。

我如何使用本書?我建議您每天閱讀一章,採取行動,設定目標,並在每章結尾的“目標和活動記錄”頁面上寫下這些行動和目標。第二天,閱讀另一章,並寫下行動和目標及其目標日期。隨著進展,開始隨機閱讀章節,並持續檢視和更新您的行動和目標,以衡量您的進展和成功。

達成卓越的系統化方法 本書提供了一種系統化和可衡量的方式,以實現您工作的卓越。我已經盡力將每個主題限制在兩頁或更少。請使用“目標和活動記錄”頁面來記錄您的進展,並充分利用您的時間。在此過程中,記錄您的經驗並在本書網站上分享。

書籍網站 許多詳細的思維導圖、新文章和討論可在書籍網站 http://InfoSecLeadersHandbook.wordpress.com 獲得。新內容將持續添加,您實際上可以在此網站上發布自己的思維導圖。我希望這個網站能由社群驅動,讓您可以分享您的經驗、工具、思維導圖和任何其他資訊,以幫助資訊安全領導者。請在網站上註冊以接收更新。