Security Leader Insights for Information Protection
17%
off

Security Leader Insights for Information Protection : Lessons and Strategies from Leading Security Professionals

Edited by 

Free delivery worldwide

Available. Dispatched from the UK in 3 business days
When will my order arrive?

Description

How do you, as a busy security executive or manager, stay current with evolving issues, familiarize yourself with the successful practices of your peers, and transfer this information to build a knowledgeable, skilled workforce the times now demand? With Security Leader Insights for Information Protection, a collection of timeless leadership best practices featuring insights from some of the nation's most successful security practitioners, you can.

This book can be used as a quick and effective resource to bring your security staff up to speed on security's role in information protection. Instead of re-inventing the wheel when faced with a new challenge, these proven practices and principles will allow you to execute with confidence knowing that your peers have done so with success. It includes chapters on the collaboration between corporate and information security, emerging issues in information protection, and information protection regulations and standards.

Security Leader Insights for Information Protection is a part of Elsevier's Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
show more

Product details

  • Paperback | 74 pages
  • 152.4 x 226.06 x 7.62mm | 204.12g
  • San Diego, United States
  • English
  • 0128008431
  • 9780128008430

Table of contents

Introduction Part 1: Strategies for Collaboration between Corporate and Information Security 1. Security and Information Technology Alignment Learn how security can benefit from existing information technology policies and explore new security and information technology collaborations. 2. Moving Beyond Convergence Forget the dated and ineffective term convergence and move to clearer ways of describing how to bring business units and technologies together to better address and manage risk. 3. What Are the Characteristics of a Good Relationship Between Corporate Security and Information Security? Learn how to develop a positive relationship between corporate security and information security with these suggestions from experienced security professionals. Part 2: Emerging Issues in Information Protection 4. Mobile Insecurity Tips and tricks to develop effective security policies that help safeguard mobile assets. 5. Security in Cloud Computing: How Is It Different? Four experts compare security issues in cloud computing with those commonly found in more traditional outsourced services. 6. The Risks of Web-Based Applications in the Workplace Three distinguished security professionals share their experiences with the use of web-based applications in the workplace. 7. Leveraging Information Lifecycle Management for Convergence and Compliance A primer on how to leverage information lifecycle management for security convergence and the protection of information assets. 8. Preventing Identity Theft by Protecting Your Data Learn how to protect your company from data breaches with these security strategies. 9. Protecting Your Company's Intellectual Property Four experts share tips for protecting corporate intellectual property through risk management policies and procedures. Part 3: Information Protection Regulations and Standards 10. The PCI Data Security Standard: Compliance Lessons Learned One experienced security executive shares advice for implementing the Payment Card Industry (PCI) Data Security Standard (DSS). 11. Is Your Data Leaking? Protect your company's data with these tips for making sure data doesn't leave the organization in an unauthorized way or, when authorized, in an insecure way. 12. Aiming for National Cybersecurity Experienced security professionals discuss recent cybersecurity breaches and call for increased public-private collaboration for national cybersecurity. 13. Understanding the FRCP's eDiscovery Rules Demystify the Federal Rules of Civil Procedure (FRCP) and learn how to protect your company's electronically stored information with these steps for compliance.
show more

Review Text

" If you are scratching your head over data leaks or cyber-security this is a useful book to give you ideas or to feel thankful that others are in the same boat."-- Professional Security Magazine Online, 22-Aug-14
show more

Review quote

" If you are scratching your head over data leaks or cyber-security this is a useful book to give you ideas or to feel thankful that others are in the same boat."-- Professional Security Magazine Online, 22-Aug-14
show more

About Bob Fahy

Bob Fahy is currently the director of corporate security at Kraft Foods. He is a seasoned multidiscipline executive security management professional with over 20 years of varied international experience in conducting and managing complex investigations; assessing threats and exposures; designing cost-effective countermeasures to mitigate threats; obtaining stakeholder consensus; and implementing appropriate asset protection programs to include but not limited to information protection, food defense, supply chain, facilities, investigations, people situational awareness, brand protection, strategic risk profiles, kidnapping, and extortion. His broad experience in multicultural, multi-threat and multilingual environments provides unique skills in formulating policies and procedures, developing effective crisis management plans, obtaining valuable strategic and tactical threat information, and directing international complex financial fraud investigations on behalf of global stakeholders. Bob is widely known as an energetic team player and objective communicator with a history of aligning the security group and programs with the clients' global and regional objectives.
show more