THE INFORMATION SECURITY MANAGEMENT SYSTEM

In spite of the views of many CISOs, securing an organization’s information assets has never really beenjustabout implementing technical security controls. The role of the traditional CISO within the typical IT department can play only a small part in solving the information security challenge. Impl...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Kouns, Jake, Kouns, Barry
Format: Buchkapitel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page 45
container_title
container_volume
creator Kouns, Jake
Kouns, Barry
description In spite of the views of many CISOs, securing an organization’s information assets has never really beenjustabout implementing technical security controls. The role of the traditional CISO within the typical IT department can play only a small part in solving the information security challenge. Implementing technical security controls defined by the CISO is only a part of the larger issue of risk management. Today’s CISO needs to adopt, promote and lead the implementation of an Information Security Management System designed to protect the organization’s information assets and ensure the life and health of the business. The International Standard,
format Book Chapter
fullrecord <record><control><sourceid>jstor_proqu</sourceid><recordid>TN_cdi_proquest_ebookcentralchapters_699181_21_45</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><jstor_id>j.ctt5hh45r.13</jstor_id><sourcerecordid>j.ctt5hh45r.13</sourcerecordid><originalsourceid>FETCH-LOGICAL-j685-85bee32185f384832bf38656e5b3c0c94a781b00537b14fc981235007ab5beaa3</originalsourceid><addsrcrecordid>eNpVj81qwzAQhFVKS0Pqd3CvBYP-LR2NcRJDbEOsHnISkpAxbqhTy33_KqSX7mGHhfmG2QeQyFwgQSWOm_DHfzeWz2CTY54TRjl8AUkIE4wjZXTADXhXhyqt2113agpVd23aV-XHqVbntCnaYl81VavS_tyrqnkFT4O5BJ_86RaoXaXKQ3bs9nVZHLOJC5YJZr0nGAk2EEEFwTYqZ9wzSxx0kppYzkLISG4RHZwUCBMGYW5sJI0hW4Dusddl_v7xYdXezvOn81_rYi5uNNfVL0Hz2wdIY6Qpi8zbnZnCOi_65g960m5d2ThStmhEyC_XpU7D</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>book_chapter</recordtype><pqid>EBC699181_21_45</pqid></control><display><type>book_chapter</type><title>THE INFORMATION SECURITY MANAGEMENT SYSTEM</title><source>O'Reilly Online Learning: Academic/Public Library Edition</source><creator>Kouns, Jake ; Kouns, Barry</creator><creatorcontrib>Kouns, Jake ; Kouns, Barry</creatorcontrib><description>In spite of the views of many CISOs, securing an organization’s information assets has never really beenjustabout implementing technical security controls. The role of the traditional CISO within the typical IT department can play only a small part in solving the information security challenge. Implementing technical security controls defined by the CISO is only a part of the larger issue of risk management. Today’s CISO needs to adopt, promote and lead the implementation of an Information Security Management System designed to protect the organization’s information assets and ensure the life and health of the business. The International Standard,</description><identifier>ISBN: 9781849281829</identifier><identifier>ISBN: 1849281823</identifier><identifier>EISBN: 9781849281836</identifier><identifier>EISBN: 1849281831</identifier><identifier>OCLC: 726735460</identifier><identifier>LCCallNum: QA76.9.A25</identifier><language>eng</language><publisher>United Kingdom: IT Governance Publishing</publisher><subject>Accountancy ; Auditing ; Auditing procedures ; Business ; Business administration ; Business audits ; Business engineering ; Business management ; Business risks ; Computer security ; Corporate planning ; Corporate strategies ; Economic disciplines ; Economics ; Finance ; Financial analysis ; Financial economics ; Financial instruments ; Financial securities ; In kind support and maintenance ; Income ; Information management ; Information science ; Management audits ; Microeconomics ; Process management ; Records management ; Risk analysis ; Risk management ; Securities management ; Unearned income</subject><ispartof>The Chief Information Security Officer, 2011, p.45</ispartof><rights>2011 Barry L. Kouns</rights><rights>2011 Jake Kouns</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttps://ebookcentral.proquest.com/covers/699181-l.jpg</thumbnail><link.rule.ids>775,776,780,789</link.rule.ids></links><search><creatorcontrib>Kouns, Jake</creatorcontrib><creatorcontrib>Kouns, Barry</creatorcontrib><title>THE INFORMATION SECURITY MANAGEMENT SYSTEM</title><title>The Chief Information Security Officer</title><description>In spite of the views of many CISOs, securing an organization’s information assets has never really beenjustabout implementing technical security controls. The role of the traditional CISO within the typical IT department can play only a small part in solving the information security challenge. Implementing technical security controls defined by the CISO is only a part of the larger issue of risk management. Today’s CISO needs to adopt, promote and lead the implementation of an Information Security Management System designed to protect the organization’s information assets and ensure the life and health of the business. The International Standard,</description><subject>Accountancy</subject><subject>Auditing</subject><subject>Auditing procedures</subject><subject>Business</subject><subject>Business administration</subject><subject>Business audits</subject><subject>Business engineering</subject><subject>Business management</subject><subject>Business risks</subject><subject>Computer security</subject><subject>Corporate planning</subject><subject>Corporate strategies</subject><subject>Economic disciplines</subject><subject>Economics</subject><subject>Finance</subject><subject>Financial analysis</subject><subject>Financial economics</subject><subject>Financial instruments</subject><subject>Financial securities</subject><subject>In kind support and maintenance</subject><subject>Income</subject><subject>Information management</subject><subject>Information science</subject><subject>Management audits</subject><subject>Microeconomics</subject><subject>Process management</subject><subject>Records management</subject><subject>Risk analysis</subject><subject>Risk management</subject><subject>Securities management</subject><subject>Unearned income</subject><isbn>9781849281829</isbn><isbn>1849281823</isbn><isbn>9781849281836</isbn><isbn>1849281831</isbn><fulltext>true</fulltext><rsrctype>book_chapter</rsrctype><creationdate>2011</creationdate><recordtype>book_chapter</recordtype><recordid>eNpVj81qwzAQhFVKS0Pqd3CvBYP-LR2NcRJDbEOsHnISkpAxbqhTy33_KqSX7mGHhfmG2QeQyFwgQSWOm_DHfzeWz2CTY54TRjl8AUkIE4wjZXTADXhXhyqt2113agpVd23aV-XHqVbntCnaYl81VavS_tyrqnkFT4O5BJ_86RaoXaXKQ3bs9nVZHLOJC5YJZr0nGAk2EEEFwTYqZ9wzSxx0kppYzkLISG4RHZwUCBMGYW5sJI0hW4Dusddl_v7xYdXezvOn81_rYi5uNNfVL0Hz2wdIY6Qpi8zbnZnCOi_65g960m5d2ThStmhEyC_XpU7D</recordid><startdate>20110505</startdate><enddate>20110505</enddate><creator>Kouns, Jake</creator><creator>Kouns, Barry</creator><general>IT Governance Publishing</general><general>IT Governance Ltd</general><scope>FFUUA</scope></search><sort><creationdate>20110505</creationdate><title>THE INFORMATION SECURITY MANAGEMENT SYSTEM</title><author>Kouns, Jake ; Kouns, Barry</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-j685-85bee32185f384832bf38656e5b3c0c94a781b00537b14fc981235007ab5beaa3</frbrgroupid><rsrctype>book_chapters</rsrctype><prefilter>book_chapters</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Accountancy</topic><topic>Auditing</topic><topic>Auditing procedures</topic><topic>Business</topic><topic>Business administration</topic><topic>Business audits</topic><topic>Business engineering</topic><topic>Business management</topic><topic>Business risks</topic><topic>Computer security</topic><topic>Corporate planning</topic><topic>Corporate strategies</topic><topic>Economic disciplines</topic><topic>Economics</topic><topic>Finance</topic><topic>Financial analysis</topic><topic>Financial economics</topic><topic>Financial instruments</topic><topic>Financial securities</topic><topic>In kind support and maintenance</topic><topic>Income</topic><topic>Information management</topic><topic>Information science</topic><topic>Management audits</topic><topic>Microeconomics</topic><topic>Process management</topic><topic>Records management</topic><topic>Risk analysis</topic><topic>Risk management</topic><topic>Securities management</topic><topic>Unearned income</topic><toplevel>online_resources</toplevel><creatorcontrib>Kouns, Jake</creatorcontrib><creatorcontrib>Kouns, Barry</creatorcontrib><collection>ProQuest Ebook Central - Book Chapters - Demo use only</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Kouns, Jake</au><au>Kouns, Barry</au><format>book</format><genre>bookitem</genre><ristype>CHAP</ristype><atitle>THE INFORMATION SECURITY MANAGEMENT SYSTEM</atitle><btitle>The Chief Information Security Officer</btitle><date>2011-05-05</date><risdate>2011</risdate><spage>45</spage><pages>45-</pages><isbn>9781849281829</isbn><isbn>1849281823</isbn><eisbn>9781849281836</eisbn><eisbn>1849281831</eisbn><abstract>In spite of the views of many CISOs, securing an organization’s information assets has never really beenjustabout implementing technical security controls. The role of the traditional CISO within the typical IT department can play only a small part in solving the information security challenge. Implementing technical security controls defined by the CISO is only a part of the larger issue of risk management. Today’s CISO needs to adopt, promote and lead the implementation of an Information Security Management System designed to protect the organization’s information assets and ensure the life and health of the business. The International Standard,</abstract><cop>United Kingdom</cop><pub>IT Governance Publishing</pub><oclcid>726735460</oclcid></addata></record>
fulltext fulltext
identifier ISBN: 9781849281829
ispartof The Chief Information Security Officer, 2011, p.45
issn
language eng
recordid cdi_proquest_ebookcentralchapters_699181_21_45
source O'Reilly Online Learning: Academic/Public Library Edition
subjects Accountancy
Auditing
Auditing procedures
Business
Business administration
Business audits
Business engineering
Business management
Business risks
Computer security
Corporate planning
Corporate strategies
Economic disciplines
Economics
Finance
Financial analysis
Financial economics
Financial instruments
Financial securities
In kind support and maintenance
Income
Information management
Information science
Management audits
Microeconomics
Process management
Records management
Risk analysis
Risk management
Securities management
Unearned income
title THE INFORMATION SECURITY MANAGEMENT SYSTEM
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-15T13%3A08%3A51IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-jstor_proqu&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=bookitem&rft.atitle=THE%20INFORMATION%20SECURITY%20MANAGEMENT%20SYSTEM&rft.btitle=The%20Chief%20Information%20Security%20Officer&rft.au=Kouns,%20Jake&rft.date=2011-05-05&rft.spage=45&rft.pages=45-&rft.isbn=9781849281829&rft.isbn_list=1849281823&rft_id=info:doi/&rft_dat=%3Cjstor_proqu%3Ej.ctt5hh45r.13%3C/jstor_proqu%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781849281836&rft.eisbn_list=1849281831&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=EBC699181_21_45&rft_id=info:pmid/&rft_jstor_id=j.ctt5hh45r.13&rfr_iscdi=true