EVALUATING AND MEASURING AN INFORMATION SECURITY PROGRAM. Information Security Risk Assessment Model (ISRAM™). Global Information Security Assessment Methodology (GISAM™). Developing an Information Security Evaluation (ISE™) Process. A Security Baseline. Background of the ISO/IEC 17799 Standard. ISO/IEC 17799:2005 Gap Analysis. ANALYSIS OF ISO/IEC 17799:2005 (27002) CONTROLS. Security Policy. Organization of Information Security. Asset Management. Human Resources Security. Physical and Environmental Security. Communications and Operations Management. Access Control. Information Systems Acquisition, Development, and Maintenance. Information Security Incident Management. Business Continuity Management. Compliance. Appendix A: ISO Standards Cited in ISO/IEC 17799:2005. Appendix B: General References. Index.
"I have had the pleasure of working with Tim on several large risk
assessment projects and I have tremendous respect for his knowledge
and experience as an information security practitioner. … Risk
assessment is the cornerstone of an effective information security
program. … striving to achieve compliance in the absence of a
risk-based security strategy can only lead to failure. … Implement
an effective risk assessment program and take control of the
compliance monster. … This book will help you do just that. I know
you will benefit from Tim's guidance on how to get the most from
your risk assessment efforts. For today's information security
leaders, there is not a topic more important."
-From the Foreword by Gary Geddes, CISSP, Strategic Security
Advisor, Microsoft Corporation
Ask a Question About this Product More... |