THE INFORMATION SECURITY MANAGEMENT SYSTEM
In spite of the views of many CISOs, securing an organization’s information assets has never really beenjustabout implementing technical security controls. The role of the traditional CISO within the typical IT department can play only a small part in solving the information security challenge. Impl...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buchkapitel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | 45 |
container_title | |
container_volume | |
creator | Kouns, Jake Kouns, Barry |
description | In spite of the views of many CISOs, securing an organization’s information assets has never really beenjustabout implementing technical security controls. The role of the traditional CISO within the typical IT department can play only a small part in solving the information security challenge. Implementing technical security controls defined by the CISO is only a part of the larger issue of risk management. Today’s CISO needs to adopt, promote and lead the implementation of an Information Security Management System designed to protect the organization’s information assets and ensure the life and health of the business. The International Standard, |
format | Book Chapter |
fullrecord | <record><control><sourceid>jstor_proqu</sourceid><recordid>TN_cdi_proquest_ebookcentralchapters_699181_21_45</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><jstor_id>j.ctt5hh45r.13</jstor_id><sourcerecordid>j.ctt5hh45r.13</sourcerecordid><originalsourceid>FETCH-LOGICAL-j685-85bee32185f384832bf38656e5b3c0c94a781b00537b14fc981235007ab5beaa3</originalsourceid><addsrcrecordid>eNpVj81qwzAQhFVKS0Pqd3CvBYP-LR2NcRJDbEOsHnISkpAxbqhTy33_KqSX7mGHhfmG2QeQyFwgQSWOm_DHfzeWz2CTY54TRjl8AUkIE4wjZXTADXhXhyqt2113agpVd23aV-XHqVbntCnaYl81VavS_tyrqnkFT4O5BJ_86RaoXaXKQ3bs9nVZHLOJC5YJZr0nGAk2EEEFwTYqZ9wzSxx0kppYzkLISG4RHZwUCBMGYW5sJI0hW4Dusddl_v7xYdXezvOn81_rYi5uNNfVL0Hz2wdIY6Qpi8zbnZnCOi_65g960m5d2ThStmhEyC_XpU7D</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>book_chapter</recordtype><pqid>EBC699181_21_45</pqid></control><display><type>book_chapter</type><title>THE INFORMATION SECURITY MANAGEMENT SYSTEM</title><source>O'Reilly Online Learning: Academic/Public Library Edition</source><creator>Kouns, Jake ; Kouns, Barry</creator><creatorcontrib>Kouns, Jake ; Kouns, Barry</creatorcontrib><description>In spite of the views of many CISOs, securing an organization’s information assets has never really beenjustabout implementing technical security controls. The role of the traditional CISO within the typical IT department can play only a small part in solving the information security challenge. Implementing technical security controls defined by the CISO is only a part of the larger issue of risk management. Today’s CISO needs to adopt, promote and lead the implementation of an Information Security Management System designed to protect the organization’s information assets and ensure the life and health of the business. The International Standard,</description><identifier>ISBN: 9781849281829</identifier><identifier>ISBN: 1849281823</identifier><identifier>EISBN: 9781849281836</identifier><identifier>EISBN: 1849281831</identifier><identifier>OCLC: 726735460</identifier><identifier>LCCallNum: QA76.9.A25</identifier><language>eng</language><publisher>United Kingdom: IT Governance Publishing</publisher><subject>Accountancy ; Auditing ; Auditing procedures ; Business ; Business administration ; Business audits ; Business engineering ; Business management ; Business risks ; Computer security ; Corporate planning ; Corporate strategies ; Economic disciplines ; Economics ; Finance ; Financial analysis ; Financial economics ; Financial instruments ; Financial securities ; In kind support and maintenance ; Income ; Information management ; Information science ; Management audits ; Microeconomics ; Process management ; Records management ; Risk analysis ; Risk management ; Securities management ; Unearned income</subject><ispartof>The Chief Information Security Officer, 2011, p.45</ispartof><rights>2011 Barry L. Kouns</rights><rights>2011 Jake Kouns</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttps://ebookcentral.proquest.com/covers/699181-l.jpg</thumbnail><link.rule.ids>775,776,780,789</link.rule.ids></links><search><creatorcontrib>Kouns, Jake</creatorcontrib><creatorcontrib>Kouns, Barry</creatorcontrib><title>THE INFORMATION SECURITY MANAGEMENT SYSTEM</title><title>The Chief Information Security Officer</title><description>In spite of the views of many CISOs, securing an organization’s information assets has never really beenjustabout implementing technical security controls. The role of the traditional CISO within the typical IT department can play only a small part in solving the information security challenge. Implementing technical security controls defined by the CISO is only a part of the larger issue of risk management. Today’s CISO needs to adopt, promote and lead the implementation of an Information Security Management System designed to protect the organization’s information assets and ensure the life and health of the business. The International Standard,</description><subject>Accountancy</subject><subject>Auditing</subject><subject>Auditing procedures</subject><subject>Business</subject><subject>Business administration</subject><subject>Business audits</subject><subject>Business engineering</subject><subject>Business management</subject><subject>Business risks</subject><subject>Computer security</subject><subject>Corporate planning</subject><subject>Corporate strategies</subject><subject>Economic disciplines</subject><subject>Economics</subject><subject>Finance</subject><subject>Financial analysis</subject><subject>Financial economics</subject><subject>Financial instruments</subject><subject>Financial securities</subject><subject>In kind support and maintenance</subject><subject>Income</subject><subject>Information management</subject><subject>Information science</subject><subject>Management audits</subject><subject>Microeconomics</subject><subject>Process management</subject><subject>Records management</subject><subject>Risk analysis</subject><subject>Risk management</subject><subject>Securities management</subject><subject>Unearned income</subject><isbn>9781849281829</isbn><isbn>1849281823</isbn><isbn>9781849281836</isbn><isbn>1849281831</isbn><fulltext>true</fulltext><rsrctype>book_chapter</rsrctype><creationdate>2011</creationdate><recordtype>book_chapter</recordtype><recordid>eNpVj81qwzAQhFVKS0Pqd3CvBYP-LR2NcRJDbEOsHnISkpAxbqhTy33_KqSX7mGHhfmG2QeQyFwgQSWOm_DHfzeWz2CTY54TRjl8AUkIE4wjZXTADXhXhyqt2113agpVd23aV-XHqVbntCnaYl81VavS_tyrqnkFT4O5BJ_86RaoXaXKQ3bs9nVZHLOJC5YJZr0nGAk2EEEFwTYqZ9wzSxx0kppYzkLISG4RHZwUCBMGYW5sJI0hW4Dusddl_v7xYdXezvOn81_rYi5uNNfVL0Hz2wdIY6Qpi8zbnZnCOi_65g960m5d2ThStmhEyC_XpU7D</recordid><startdate>20110505</startdate><enddate>20110505</enddate><creator>Kouns, Jake</creator><creator>Kouns, Barry</creator><general>IT Governance Publishing</general><general>IT Governance Ltd</general><scope>FFUUA</scope></search><sort><creationdate>20110505</creationdate><title>THE INFORMATION SECURITY MANAGEMENT SYSTEM</title><author>Kouns, Jake ; Kouns, Barry</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-j685-85bee32185f384832bf38656e5b3c0c94a781b00537b14fc981235007ab5beaa3</frbrgroupid><rsrctype>book_chapters</rsrctype><prefilter>book_chapters</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Accountancy</topic><topic>Auditing</topic><topic>Auditing procedures</topic><topic>Business</topic><topic>Business administration</topic><topic>Business audits</topic><topic>Business engineering</topic><topic>Business management</topic><topic>Business risks</topic><topic>Computer security</topic><topic>Corporate planning</topic><topic>Corporate strategies</topic><topic>Economic disciplines</topic><topic>Economics</topic><topic>Finance</topic><topic>Financial analysis</topic><topic>Financial economics</topic><topic>Financial instruments</topic><topic>Financial securities</topic><topic>In kind support and maintenance</topic><topic>Income</topic><topic>Information management</topic><topic>Information science</topic><topic>Management audits</topic><topic>Microeconomics</topic><topic>Process management</topic><topic>Records management</topic><topic>Risk analysis</topic><topic>Risk management</topic><topic>Securities management</topic><topic>Unearned income</topic><toplevel>online_resources</toplevel><creatorcontrib>Kouns, Jake</creatorcontrib><creatorcontrib>Kouns, Barry</creatorcontrib><collection>ProQuest Ebook Central - Book Chapters - Demo use only</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Kouns, Jake</au><au>Kouns, Barry</au><format>book</format><genre>bookitem</genre><ristype>CHAP</ristype><atitle>THE INFORMATION SECURITY MANAGEMENT SYSTEM</atitle><btitle>The Chief Information Security Officer</btitle><date>2011-05-05</date><risdate>2011</risdate><spage>45</spage><pages>45-</pages><isbn>9781849281829</isbn><isbn>1849281823</isbn><eisbn>9781849281836</eisbn><eisbn>1849281831</eisbn><abstract>In spite of the views of many CISOs, securing an organization’s information assets has never really beenjustabout implementing technical security controls. The role of the traditional CISO within the typical IT department can play only a small part in solving the information security challenge. Implementing technical security controls defined by the CISO is only a part of the larger issue of risk management. Today’s CISO needs to adopt, promote and lead the implementation of an Information Security Management System designed to protect the organization’s information assets and ensure the life and health of the business. The International Standard,</abstract><cop>United Kingdom</cop><pub>IT Governance Publishing</pub><oclcid>726735460</oclcid></addata></record> |
fulltext | fulltext |
identifier | ISBN: 9781849281829 |
ispartof | The Chief Information Security Officer, 2011, p.45 |
issn | |
language | eng |
recordid | cdi_proquest_ebookcentralchapters_699181_21_45 |
source | O'Reilly Online Learning: Academic/Public Library Edition |
subjects | Accountancy Auditing Auditing procedures Business Business administration Business audits Business engineering Business management Business risks Computer security Corporate planning Corporate strategies Economic disciplines Economics Finance Financial analysis Financial economics Financial instruments Financial securities In kind support and maintenance Income Information management Information science Management audits Microeconomics Process management Records management Risk analysis Risk management Securities management Unearned income |
title | THE INFORMATION SECURITY MANAGEMENT SYSTEM |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-15T13%3A08%3A51IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-jstor_proqu&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=bookitem&rft.atitle=THE%20INFORMATION%20SECURITY%20MANAGEMENT%20SYSTEM&rft.btitle=The%20Chief%20Information%20Security%20Officer&rft.au=Kouns,%20Jake&rft.date=2011-05-05&rft.spage=45&rft.pages=45-&rft.isbn=9781849281829&rft.isbn_list=1849281823&rft_id=info:doi/&rft_dat=%3Cjstor_proqu%3Ej.ctt5hh45r.13%3C/jstor_proqu%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781849281836&rft.eisbn_list=1849281831&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=EBC699181_21_45&rft_id=info:pmid/&rft_jstor_id=j.ctt5hh45r.13&rfr_iscdi=true |