Normal view MARC view ISBD view

IT Security Management [electronic resource] : IT Securiteers - Setting up an IT Security Function / by Alberto Partida, Diego Andina.

By: Partida, Alberto [author.].
Contributor(s): Andina, Diego [author.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Lecture Notes in Electrical Engineering: 61Publisher: Dordrecht : Springer Netherlands : Imprint: Springer, 2010Description: XXXV, 247p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9789048188826.Subject(s): Computer science | Computer Communication Networks | Data protection | Information Systems | Telecommunication | Computer Science | Systems and Data Security | Communications Engineering, Networks | Computer Communication Networks | Management of Computing and Information SystemsDDC classification: 005.8 Online resources: Click here to access online
Contents:
Vulnerabilities, Threats and Risks in IT -- Security and IT Background -- The Team–Individual Contract -- What to Do: The IT Security Roadmap -- How to Do It: Organise the Work in “Baby Steps” -- Team Dynamics: Building a “Human System” -- Viral Marketing -- Management Support: An Indispensable Ingredient -- Social Networking for IT Security Professionals -- Present, Future and Beauty of IT Security.
In: Springer eBooksSummary: IT securiteers - The human and technical dimension working for the organisation. Current corporate governance regulations and international standards lead many organisations, big and small, to the creation of an information technology (IT) security function in their organisational chart or to the acquisition of services from the IT security industry. More often than desired, these teams are only useful for companies’ executives to tick the corresponding box in a certification process, be it ISO, ITIL, PCI, etc. Many IT security teams do not provide business value to their company. They fail to really protect the organisation from the increasing number of threats targeting its information systems. IT Security Management provides an insight into how to create and grow a team of passionate IT security professionals. We will call them “securiteers”. They will add value to the business, improving the information security stance of organisations.
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

Vulnerabilities, Threats and Risks in IT -- Security and IT Background -- The Team–Individual Contract -- What to Do: The IT Security Roadmap -- How to Do It: Organise the Work in “Baby Steps” -- Team Dynamics: Building a “Human System” -- Viral Marketing -- Management Support: An Indispensable Ingredient -- Social Networking for IT Security Professionals -- Present, Future and Beauty of IT Security.

IT securiteers - The human and technical dimension working for the organisation. Current corporate governance regulations and international standards lead many organisations, big and small, to the creation of an information technology (IT) security function in their organisational chart or to the acquisition of services from the IT security industry. More often than desired, these teams are only useful for companies’ executives to tick the corresponding box in a certification process, be it ISO, ITIL, PCI, etc. Many IT security teams do not provide business value to their company. They fail to really protect the organisation from the increasing number of threats targeting its information systems. IT Security Management provides an insight into how to create and grow a team of passionate IT security professionals. We will call them “securiteers”. They will add value to the business, improving the information security stance of organisations.

There are no comments for this item.

Log in to your account to post a comment.

2017 | The Technical University of Kenya Library | +254(020) 2219929, 3341639, 3343672 | library@tukenya.ac.ke | Haile Selassie Avenue