Author: Alan Calder
Publisher: Kogan Page Publishers
ISBN: 0749464860
Category : Business & Economics
Languages : en
Pages : 384
Book Description
For many companies, their intellectual property can often be more valuable than their physical assets. Having an effective IT governance strategy in place can protect this intellectual property, reducing the risk of theft and infringement. Data protection, privacy and breach regulations, computer misuse around investigatory powers are part of a complex and often competing range of requirements to which directors must respond. There is increasingly the need for an overarching information security framework that can provide context and coherence to compliance activity worldwide. IT Governance is a key resource for forward-thinking managers and executives at all levels, enabling them to understand how decisions about information technology in the organization should be made and monitored, and, in particular, how information security risks are best dealt with. The development of IT governance - which recognises the convergence between business practice and IT management - makes it essential for managers at all levels, and in organizations of all sizes, to understand how best to deal with information security risk. The new edition has been full updated to take account of the latest regulatory and technological developments, including the creation of the International Board for IT Governance Qualifications. IT Governance also includes new material on key international markets - including the UK and the US, Australia and South Africa.
IT Governance
IT Governance – An international guide to data security and ISO 27001/ISO 27002, Eighth edition
Author: Alan Calder
Publisher: IT Governance Ltd
ISBN: 1787784096
Category : Business & Economics
Languages : en
Pages : 486
Book Description
Recommended textbook for the Open University’s postgraduate information security course and the recommended text for all IBITGQ ISO 27001 courses In this updated edition, renowned ISO 27001/27002 experts Alan Calder and Steve Watkins: Discuss the ISO 27001/27002:2022 updates; Provide guidance on how to establish a strong IT governance system and an ISMS (information security management system) that complies with ISO 27001 and ISO 27002; Highlight why data protection and information security are vital in our ever-changing online and physical environments; Reflect on changes to international legislation, e.g. the GDPR (General Data Protection Regulation); and Review key topics such as risk assessment, asset management, controls, security, supplier relationships and compliance. Fully updated to align with ISO 27001/27002:2022 IT Governance – An international guide to data security and ISO 27001/ISO 27002, Eighth edition provides: Expert information security management and governance guidance based on international best practice; Guidance on how to protect and enhance your organisation with an ISO 27001:2022-compliant ISMS; and Discussion around the changes to international legislation, including ISO 27001:2022 and ISO 27002:2022. As cyber threats continue to increase in prevalence and ferocity, it is more important than ever to implement a secure ISMS to protect your organisation. Certifying your ISMS to ISO 27001 and ISO 27002 demonstrates to customers and stakeholders that your organisation is handling data securely.
Publisher: IT Governance Ltd
ISBN: 1787784096
Category : Business & Economics
Languages : en
Pages : 486
Book Description
Recommended textbook for the Open University’s postgraduate information security course and the recommended text for all IBITGQ ISO 27001 courses In this updated edition, renowned ISO 27001/27002 experts Alan Calder and Steve Watkins: Discuss the ISO 27001/27002:2022 updates; Provide guidance on how to establish a strong IT governance system and an ISMS (information security management system) that complies with ISO 27001 and ISO 27002; Highlight why data protection and information security are vital in our ever-changing online and physical environments; Reflect on changes to international legislation, e.g. the GDPR (General Data Protection Regulation); and Review key topics such as risk assessment, asset management, controls, security, supplier relationships and compliance. Fully updated to align with ISO 27001/27002:2022 IT Governance – An international guide to data security and ISO 27001/ISO 27002, Eighth edition provides: Expert information security management and governance guidance based on international best practice; Guidance on how to protect and enhance your organisation with an ISO 27001:2022-compliant ISMS; and Discussion around the changes to international legislation, including ISO 27001:2022 and ISO 27002:2022. As cyber threats continue to increase in prevalence and ferocity, it is more important than ever to implement a secure ISMS to protect your organisation. Certifying your ISMS to ISO 27001 and ISO 27002 demonstrates to customers and stakeholders that your organisation is handling data securely.
IT Governance
Author: Alan Calder
Publisher: Kogan Page Publishers
ISBN: 0749496967
Category : Business & Economics
Languages : en
Pages : 408
Book Description
Faced with the compliance requirements of increasingly punitive information and privacy-related regulation, as well as the proliferation of complex threats to information security, there is an urgent need for organizations to adopt IT governance best practice. IT Governance is a key international resource for managers in organizations of all sizes and across industries, and deals with the strategic and operational aspects of information security. Now in its seventh edition, the bestselling IT Governance provides guidance for companies looking to protect and enhance their information security management systems (ISMS) and protect themselves against cyber threats. The new edition covers changes in global regulation, particularly GDPR, and updates to standards in the ISO/IEC 27000 family, BS 7799-3:2017 (information security risk management) plus the latest standards on auditing. It also includes advice on the development and implementation of an ISMS that will meet the ISO 27001 specification and how sector-specific standards can and should be factored in. With information on risk assessments, compliance, equipment and operations security, controls against malware and asset management, IT Governance is the definitive guide to implementing an effective information security management and governance system.
Publisher: Kogan Page Publishers
ISBN: 0749496967
Category : Business & Economics
Languages : en
Pages : 408
Book Description
Faced with the compliance requirements of increasingly punitive information and privacy-related regulation, as well as the proliferation of complex threats to information security, there is an urgent need for organizations to adopt IT governance best practice. IT Governance is a key international resource for managers in organizations of all sizes and across industries, and deals with the strategic and operational aspects of information security. Now in its seventh edition, the bestselling IT Governance provides guidance for companies looking to protect and enhance their information security management systems (ISMS) and protect themselves against cyber threats. The new edition covers changes in global regulation, particularly GDPR, and updates to standards in the ISO/IEC 27000 family, BS 7799-3:2017 (information security risk management) plus the latest standards on auditing. It also includes advice on the development and implementation of an ISMS that will meet the ISO 27001 specification and how sector-specific standards can and should be factored in. With information on risk assessments, compliance, equipment and operations security, controls against malware and asset management, IT Governance is the definitive guide to implementing an effective information security management and governance system.
ISO 27001/ISO 27002 - A guide to information security management systems
Author: Alan Calder
Publisher: IT Governance Ltd
ISBN: 1787784940
Category : Computers
Languages : en
Pages : 80
Book Description
ISO 27001/ISO 27002 – A guide to information security management systems ISO 27001 is one of the leading information security standards. It offers an internationally recognised route for organisations of all sizes and industries to adopt and demonstrate effective, independently verified information security. Information is the lifeblood of the modern world. It is at the heart of our personal and working lives, yet all too often control of that information is in the hands of organisations, not individuals. As a result, there is ever-increasing pressure on those organisations to ensure the information they hold is adequately protected. Demonstrating that an organisation is a responsible custodian of information is not simply a matter of complying with the law – it has become a defining factor in an organisation’s success or failure. The negative publicity and loss of trust associated with data breaches and cyber attacks can seriously impact customer retention and future business opportunities, while an increasing number of tender opportunities are only open to those with independently certified information security measures. Understand how information security standards can improve your organisation’s security and set it apart from competitors with this introduction to the 2022 updates of ISO 27001 and ISO 27002.
Publisher: IT Governance Ltd
ISBN: 1787784940
Category : Computers
Languages : en
Pages : 80
Book Description
ISO 27001/ISO 27002 – A guide to information security management systems ISO 27001 is one of the leading information security standards. It offers an internationally recognised route for organisations of all sizes and industries to adopt and demonstrate effective, independently verified information security. Information is the lifeblood of the modern world. It is at the heart of our personal and working lives, yet all too often control of that information is in the hands of organisations, not individuals. As a result, there is ever-increasing pressure on those organisations to ensure the information they hold is adequately protected. Demonstrating that an organisation is a responsible custodian of information is not simply a matter of complying with the law – it has become a defining factor in an organisation’s success or failure. The negative publicity and loss of trust associated with data breaches and cyber attacks can seriously impact customer retention and future business opportunities, while an increasing number of tender opportunities are only open to those with independently certified information security measures. Understand how information security standards can improve your organisation’s security and set it apart from competitors with this introduction to the 2022 updates of ISO 27001 and ISO 27002.
ITIL® 4 Essentials: Your essential guide for the ITIL 4 Foundation exam and beyond, second edition
Author: Claire Agutter
Publisher: IT Governance Ltd
ISBN: 1787782204
Category : Computers
Languages : en
Pages : 211
Book Description
ITIL® 4 Essentials contains everything you need to know to pass the ITIL 4 Foundation Certificate, plus more. It covers practices and concepts that are not addressed as part of the Foundation syllabus, making it ideal for newly qualified practitioners. This second edition has been updated to align with amendments to the ITIL® 4 Foundation syllabus.
Publisher: IT Governance Ltd
ISBN: 1787782204
Category : Computers
Languages : en
Pages : 211
Book Description
ITIL® 4 Essentials contains everything you need to know to pass the ITIL 4 Foundation Certificate, plus more. It covers practices and concepts that are not addressed as part of the Foundation syllabus, making it ideal for newly qualified practitioners. This second edition has been updated to align with amendments to the ITIL® 4 Foundation syllabus.
ISO 27001 Controls – A guide to implementing and auditing, Second edition
Author: Bridget Kenyon
Publisher: IT Governance Ltd
ISBN: 1787784312
Category : Computers
Languages : en
Pages : 249
Book Description
Following the success of the first edition, this book has been re-released to reflect the ISO/IEC 27001:2022 and ISO/IEC 27002:2022 updates. Ideal for information security managers, auditors, consultants and organisations preparing for ISO 27001:2022 certification, this book will help readers understand the requirements of an ISMS (information security management system) based on ISO 27001:2022. Similarly, for anyone involved in internal or external audits, the book includes the definitive requirements that auditors must address when certifying organisations to ISO 27001:2022. The auditing guidance covers what evidence an auditor should look for to satisfy themselves that the requirement has been met. This guidance is useful for internal auditors and consultants, as well as information security managers and lead implementers as a means of confirming that their implementation and evidence to support it will be sufficient to pass an audit. This guide is intended to be used by those involved in: Designing, implementing and/or maintaining an ISMS; Preparing for ISMS audits and assessments; or Undertaking both internal and third-party ISMS audits and assessments.
Publisher: IT Governance Ltd
ISBN: 1787784312
Category : Computers
Languages : en
Pages : 249
Book Description
Following the success of the first edition, this book has been re-released to reflect the ISO/IEC 27001:2022 and ISO/IEC 27002:2022 updates. Ideal for information security managers, auditors, consultants and organisations preparing for ISO 27001:2022 certification, this book will help readers understand the requirements of an ISMS (information security management system) based on ISO 27001:2022. Similarly, for anyone involved in internal or external audits, the book includes the definitive requirements that auditors must address when certifying organisations to ISO 27001:2022. The auditing guidance covers what evidence an auditor should look for to satisfy themselves that the requirement has been met. This guidance is useful for internal auditors and consultants, as well as information security managers and lead implementers as a means of confirming that their implementation and evidence to support it will be sufficient to pass an audit. This guide is intended to be used by those involved in: Designing, implementing and/or maintaining an ISMS; Preparing for ISMS audits and assessments; or Undertaking both internal and third-party ISMS audits and assessments.
ISO 27001 Controls - A Guide to Implementing and Auditing
Author: Bridget Kenyon
Publisher:
ISBN: 9781787782402
Category :
Languages : en
Pages : 21989
Book Description
Ideal for information security managers, auditors, consultants and organisations preparing for ISO 27001 certification, this book will help readers understand the requirements of an ISMS (information security management system) based on ISO 27001.
Publisher:
ISBN: 9781787782402
Category :
Languages : en
Pages : 21989
Book Description
Ideal for information security managers, auditors, consultants and organisations preparing for ISO 27001 certification, this book will help readers understand the requirements of an ISMS (information security management system) based on ISO 27001.
Nine Steps to Success - An ISO 27001:2022 Implementation Overview
Author: Alan Calder
Publisher: IT Governance Ltd
ISBN: 1787785424
Category : Computers
Languages : en
Pages : 123
Book Description
Essential guidance for anyone tackling ISO 27001:2022 implementation for the first time. ISO/IEC 27001:2022 is the blueprint for managing information security in line with an organisation’s business, contractual and regulatory requirements, and its risk appetite. Nine Steps to Success has been updated to reflect the 2022 version of ISO 27001. This must-have guide from expert Alan Calder will help you get to grips with the requirements of the Standard and make your ISO 27001 implementation project a success. The guide: Details the key steps of an ISO 27001 project from inception to certification; Explains each element of the ISO 27001 project in simple, non-technical language; and Is ideal for anyone tackling ISO 27001 implementation for the first time. Cyber risk has become a critical business issue, with senior management increasingly under pressure – from customers, regulators and partners – to ensure their organisation can defend against, respond to and recover from cyber attacks. To be resilient against cyber attacks, organisations must do more than just erect digital defences; a significant percentage of successful attacks originate in the physical world or are aided and exacerbated by environmental vulnerabilities. Effective cyber security therefore requires a comprehensive, systematic and robust ISMS (information security management system), with boards, customers and regulators all seeking assurance that information risks have been identified and are being managed. An organisation can achieve a robust ISMS by implementing ISO 27001:2022. This guide will help you: Understand how to implement ISO 27001:2022 in your organisation; Integrate your ISO 27001 ISMS with an ISO 9001 QMS (quality management system) and other management systems; Address the documentation challenges you will face as you create policies, procedures, work instructions and records; and continually improve your ISMS, including internal auditing, testing and management review
Publisher: IT Governance Ltd
ISBN: 1787785424
Category : Computers
Languages : en
Pages : 123
Book Description
Essential guidance for anyone tackling ISO 27001:2022 implementation for the first time. ISO/IEC 27001:2022 is the blueprint for managing information security in line with an organisation’s business, contractual and regulatory requirements, and its risk appetite. Nine Steps to Success has been updated to reflect the 2022 version of ISO 27001. This must-have guide from expert Alan Calder will help you get to grips with the requirements of the Standard and make your ISO 27001 implementation project a success. The guide: Details the key steps of an ISO 27001 project from inception to certification; Explains each element of the ISO 27001 project in simple, non-technical language; and Is ideal for anyone tackling ISO 27001 implementation for the first time. Cyber risk has become a critical business issue, with senior management increasingly under pressure – from customers, regulators and partners – to ensure their organisation can defend against, respond to and recover from cyber attacks. To be resilient against cyber attacks, organisations must do more than just erect digital defences; a significant percentage of successful attacks originate in the physical world or are aided and exacerbated by environmental vulnerabilities. Effective cyber security therefore requires a comprehensive, systematic and robust ISMS (information security management system), with boards, customers and regulators all seeking assurance that information risks have been identified and are being managed. An organisation can achieve a robust ISMS by implementing ISO 27001:2022. This guide will help you: Understand how to implement ISO 27001:2022 in your organisation; Integrate your ISO 27001 ISMS with an ISO 9001 QMS (quality management system) and other management systems; Address the documentation challenges you will face as you create policies, procedures, work instructions and records; and continually improve your ISMS, including internal auditing, testing and management review
Cyber Essentials - A guide to the Cyber Essentials and Cyber Essentials Plus certifications
Author: Alan Calder
Publisher: IT Governance Ltd
ISBN: 1787784355
Category : Computers
Languages : en
Pages : 83
Book Description
Cyber Essentials – A guide to Cyber Essentials and Cyber Essentials Plus certifications Cyber attacks are a fact of life in the information age. For any organisation that connects to the Internet, the issue is not if an attack will come, but when. Most cyber attacks are performed by relatively unskilled criminals using tools available online. These attacks are often opportunistic: looking for easy targets rather than rich pickings. The Cyber Essentials scheme is a UK government-backed effort to encourage UK-based organisations to improve their cyber security by adopting measures (called controls) that defend against common, less-sophisticated cyber attacks. The scheme recommends practical defences that should be within the capability of any organisation. The Cyber Essentials scheme has two levels: The basic Cyber Essentials; and Cyber Essentials Plus. This first part of this book will examine the various threats that are most significant in the modern digital environment, their targets and their impacts. It will help you to understand whether your organisation is ready for Cyber Essentials or Cyber Essentials Plus certification. The second part of the book presents a selection of additional resources that are available to help you implement the controls or become certified.
Publisher: IT Governance Ltd
ISBN: 1787784355
Category : Computers
Languages : en
Pages : 83
Book Description
Cyber Essentials – A guide to Cyber Essentials and Cyber Essentials Plus certifications Cyber attacks are a fact of life in the information age. For any organisation that connects to the Internet, the issue is not if an attack will come, but when. Most cyber attacks are performed by relatively unskilled criminals using tools available online. These attacks are often opportunistic: looking for easy targets rather than rich pickings. The Cyber Essentials scheme is a UK government-backed effort to encourage UK-based organisations to improve their cyber security by adopting measures (called controls) that defend against common, less-sophisticated cyber attacks. The scheme recommends practical defences that should be within the capability of any organisation. The Cyber Essentials scheme has two levels: The basic Cyber Essentials; and Cyber Essentials Plus. This first part of this book will examine the various threats that are most significant in the modern digital environment, their targets and their impacts. It will help you to understand whether your organisation is ready for Cyber Essentials or Cyber Essentials Plus certification. The second part of the book presents a selection of additional resources that are available to help you implement the controls or become certified.
Cyber resilience - Defence-in-depth principles
Author: Alan Calder
Publisher: IT Governance Ltd
ISBN: 1787784398
Category : Computers
Languages : en
Pages : 142
Book Description
We live in a world where technology and vast quantities of data play a considerable role in everyday life, both personal and professional. For the foreseeable future (and perhaps beyond), the growth and prominence of data in business shows no signs of slowing down, even if the technology in question will likely change in ways perhaps unimaginable today. Naturally, all this innovation brings huge opportunities and benefits to organisations and people alike. However, these come at more than just a financial cost. In the world as we know it, you can be attacked both physically and virtually. For today’s organisations, which rely so heavily on technology – particularly the Internet – to do business, the latter attack is the far more threatening of the two. The cyber threat landscape is complex and constantly changing. For every vulnerability fixed, another pops up, ripe for exploitation. Worse, when a vulnerability is identified, a tool that can exploit it is often developed and used within hours – faster than the time it normally takes for the vendor to release a patch, and certainly quicker than the time many organisations take to install that patch. This book has been divided into two parts: Part 1: Security principles. Part 2: Reference controls. Part 1 is designed to give you a concise but solid grounding in the principles of good security, covering key terms, risk management, different aspects of security, defence in depth, implementation tips, and more. This part is best read from beginning to end. Part 2 is intended as a useful reference, discussing a wide range of good-practice controls (in alphabetical order) you may want to consider implementing. Each control is discussed at a high level, focusing on the broader principles, concepts and points to consider, rather than specific solutions. Each control has also been written as a stand-alone chapter, so you can just read the controls that interest you, in an order that suits you.
Publisher: IT Governance Ltd
ISBN: 1787784398
Category : Computers
Languages : en
Pages : 142
Book Description
We live in a world where technology and vast quantities of data play a considerable role in everyday life, both personal and professional. For the foreseeable future (and perhaps beyond), the growth and prominence of data in business shows no signs of slowing down, even if the technology in question will likely change in ways perhaps unimaginable today. Naturally, all this innovation brings huge opportunities and benefits to organisations and people alike. However, these come at more than just a financial cost. In the world as we know it, you can be attacked both physically and virtually. For today’s organisations, which rely so heavily on technology – particularly the Internet – to do business, the latter attack is the far more threatening of the two. The cyber threat landscape is complex and constantly changing. For every vulnerability fixed, another pops up, ripe for exploitation. Worse, when a vulnerability is identified, a tool that can exploit it is often developed and used within hours – faster than the time it normally takes for the vendor to release a patch, and certainly quicker than the time many organisations take to install that patch. This book has been divided into two parts: Part 1: Security principles. Part 2: Reference controls. Part 1 is designed to give you a concise but solid grounding in the principles of good security, covering key terms, risk management, different aspects of security, defence in depth, implementation tips, and more. This part is best read from beginning to end. Part 2 is intended as a useful reference, discussing a wide range of good-practice controls (in alphabetical order) you may want to consider implementing. Each control is discussed at a high level, focusing on the broader principles, concepts and points to consider, rather than specific solutions. Each control has also been written as a stand-alone chapter, so you can just read the controls that interest you, in an order that suits you.