The Information Systems Security Officer's Guide: Establishing and Managing a Cyber Security Program, Third Edition

  • 6h 23m
  • Gerald L. Kovacich
  • Elsevier Science and Technology Books, Inc.
  • 2016

The Information Systems Security Officer's Guide: Establishing and Managing a Cyber Security Program, Third Edition, provides users with information on how to combat the ever-changing myriad of threats security professionals face. This entirely updated edition presents practical advice on establishing, managing, and evaluating a successful information protection program in a corporation or government agency, covering everything from effective communication to career guidance for the information security officer.

The book outlines how to implement a new plan or evaluate an existing one, and is especially targeted to those who are new to the topic. It is the definitive resource for learning the key characteristics of an effective information systems security officer (ISSO), and paints a comprehensive portrait of an ISSO's duties, their challenges, and working environments, from handling new technologies and threats, to performing information security duties in a national security environment.

  • Provides updated chapters that reflect the latest technological changes and advances in countering the latest information security threats and risks and how they relate to corporate security and crime investigation
  • Includes new topics, such as forensics labs and information warfare, as well as how to liaison with attorneys, law enforcement, and other agencies others outside the organization
  • Written in an accessible, easy-to-read style

About the Author

Dr. Kovacich has over 40 years of security, criminal and civil investigations, anti-fraud, information warfare, and information systems security experience in both government as a special agent and as a manager in international corporations. Dr. Kovacich currently resides on an island in Washington state where he continues to write, lecture and conduct research relative to information systems security, information warfare defensive and offensive operations, high-technology crime and techno-terrorism.

In this Book

  • Introduction
  • Understanding the past and Present Cyber-Information World Environment
  • Understanding the past and Present Global Business and Management Environment
  • An Overview of Related World Views of Cyber Security
  • A Glimpse at the History of Technology
  • Understanding Today's Threats in the Cyber Vapor—“War Stories” from the Front Lines
  • The Cyber Security Officer's Position, Duties, and Responsibilities
  • The Cyber Security Program's Strategic, Tactical, and Annual Plans
  • Establishing a Cyber Security Program and Organization
  • Determining and Establishing Cyber Security Functions
  • Establishing a Metrics Management System
  • Annual Reevaluation and Future Plans
  • High-Technology Crimes Investigative Support
  • Introduction to Global Information Warfare
  • The Cyber Security Officer and Privacy, Ethical, and Liability Issues
  • A Career as a Cyber Security Officer
  • A Look at the Possible Future
SHOW MORE
FREE ACCESS

YOU MIGHT ALSO LIKE

Rating 4.0 of 7 users Rating 4.0 of 7 users (7)
Rating 4.6 of 123 users Rating 4.6 of 123 users (123)
Rating 4.8 of 44 users Rating 4.8 of 44 users (44)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE