Book description
Truly a practical work, this handbook offers a comprehensive roadmap for designing and implementing an effective information security program based on real world scenarios. It builds a bridge between high-level theory and practical execution by illustrating solutions to practical issues often overlooked by theoretical texts. This leads to a set of practices that security professionals can use every day. The framework it describes can be expanded or contracted to meet the needs of almost any organization. A reference as well as a guide, each of the chapters are self-contained and can be read in any order.
Table of contents
- Front cover
- Table of Contents (1/2)
- Table of Contents (2/2)
- Foreword
- Acknowledgments
- Introduction (1/2)
- Introduction (2/2)
-
Chapter 1
-
Assess
- Overview
- Foundation Concepts (1/11)
- Foundation Concepts (2/11)
- Foundation Concepts (3/11)
- Foundation Concepts (4/11)
- Foundation Concepts (5/11)
- Foundation Concepts (6/11)
- Foundation Concepts (7/11)
- Foundation Concepts (8/11)
- Foundation Concepts (9/11)
- Foundation Concepts (10/11)
- Foundation Concepts (11/11)
-
Assess
-
Chapter 2
-
Plan
- Overview
- Foundation Concepts
- Critical Skills (1/2)
- Critical Skills (2/2)
- Planning Methodology (1/9)
- Planning Methodology (2/9)
- Planning Methodology (3/9)
- Planning Methodology (4/9)
- Planning Methodology (5/9)
- Planning Methodology (6/9)
- Planning Methodology (7/9)
- Planning Methodology (8/9)
- Planning Methodology (9/9)
- Planning Summary
- Planning Checklist
-
Plan
-
Chapter 3
-
Design
- Overview
-
Foundation Concepts
- Critical Skills
-
Critical Knowledge
- Opportunity Cost
- Security Documents
- Policies
- Standards
- Procedures
- Guidelines
- Example
- Risks, Threats, and Vulnerabilities … Oh My!
- Example
- Types of Security Controls
- Preventive Controls
- Detective Controls
- Gap Analysis
- SMART Statements
- Types of Projects
- People Projects
- Process Projects
- Technology Projects
- Methodology (1/8)
- Methodology (2/8)
- Methodology (3/8)
- Methodology (4/8)
- Methodology (5/8)
- Methodology (6/8)
- Methodology (7/8)
-
Methodology (8/8)
- Preview
- Security Document Development
- Project Portfolio Development
- Communication Plan Development
- Incorporating Your Enterprise Drivers
- Requirements
- Gap Analysis
- Building Security Policies, Standards, Procedures, and Guidelines
- Build Security Documents Summary
-
Building the Security Project Portfolio
- Performing the Policy Gap Analysis
- Example
- Analysis
- Defining Ambiguities
- Evaluating Controls (Gap Analysis)
- Risk and Exposure Statements
- Risk Rating
- Risk Rating - High
- Deriving the Security Projects
- Quantitative Evaluation
- Qualitative Evaluation
- Cursory Project Scoping
- Projects Versus Core
- Scheduling (First Three Years)
- Capital Budgeting
- Approval of the Security Project Portfolio
- Believe in Your Product
- Ensure That Your Logic for Prioritization Is Understood
- Know Your Product
- Know What Others Are Buying
- Identify the Buyers and the Roadblocks
- Those Who Will Buy Your Offerings
- Those Who Will Not Buy Any of Your Offerings
- Those Who Can Apply Pressure to Individuals Who Won’t Buy Your Offerings
- Sell through Momentum
- Sell through Others
- Ensure That It’s Sold before You Attempt to Sell It
- Always Present in Person
- Summary
- Annual Portfolio Review
- Build the Communication Plan
- Chapter Summary
- Design Checklist
-
Design
-
Chapter 4
-
Execute
- Overview
- Foundation Concepts (1/12)
- Foundation Concepts (2/12)
- Foundation Concepts (3/12)
- Foundation Concepts (4/12)
- Foundation Concepts (5/12)
- Foundation Concepts (6/12)
- Foundation Concepts (7/12)
- Foundation Concepts (8/12)
- Foundation Concepts (9/12)
- Foundation Concepts (10/12)
- Foundation Concepts (11/12)
-
Foundation Concepts (12/12)
- Preview
- Critical Skills
- Critical Knowledge
- Methodology
-
Project Execution
- Development Methodology Structure
- Critical Success Factors for a Project
- Business, Functional, and Technical Requirements
- Marketing Metrics
- Project Governance Model
- Management Support - Sponsorship
- Establish a Team
- Shared Vision
- Formalized Project Plan (Gantt Chart)
- Identifying and Working through the Lull of Doom
- Critical Success Factors Summary
- Warning Signs for Projects
- Train Wrecks
- Project Types and Their Intricacies
- Common Guidelines for All Projects
- Common Guidelines for People Projects
- Common Guidelines for Process Projects
- Common Guidelines for Technology Projects
- Project Type Summary
- Incorporating Security into Projects
- Tools for Adding Security into a Properly Structured Project
- Deploy
- Tools for Adding Security into a Project with Missing Components
- Vendor Evaluation/Selection
- Preparing the Marketing Material
- Chapter Summary
-
Execute
-
Chapter 5
- Report
- Chapter 6
- Appendix A
- Appendix B
- Appendix C
- Appendix D
- Appendix E
- Index
Product information
- Title: The CISO Handbook
- Author(s):
- Release date: April 2016
- Publisher(s): Auerbach Publications
- ISBN: 9781420031379
You might also like
book
Anatomy of an Incident
When it comes to system design, failure is inevitable. Scientists and engineers implement solutions based on …
book
ISO27001/ISO27002 A Pocket Guide, 2nd edition
Information is one of your organisation’s most important resources and keeping that information secure is vital …
book
CISSP® Study Guide, 4th Edition
CISSP® Study Guide, Fourth Edition provides the latest updates on CISSP® certification, the most prestigious, globally-recognized, …
book
The CISO Evolution
Learn to effectively deliver business aligned cybersecurity outcomes In The CISO Evolution: Business Knowledge for Cybersecurity …