Managing an Information Security and Privacy Awareness and Training Program, Second Edition

Managing an Information Security and Privacy Awareness and Training Program, Second Edition
Author :
Publisher : CRC Press
Total Pages : 568
Release :
ISBN-10 : 1439815461
ISBN-13 : 9781439815465
Rating : 4/5 (465 Downloads)

Book Synopsis Managing an Information Security and Privacy Awareness and Training Program, Second Edition by : Rebecca Herold

Download or read book Managing an Information Security and Privacy Awareness and Training Program, Second Edition written by Rebecca Herold and published by CRC Press. This book was released on 2010-08-24 with total page 568 pages. Available in PDF, EPUB and Kindle. Book excerpt: Starting with the inception of an education program and progressing through its development, implementation, delivery, and evaluation, Managing an Information Security and Privacy Awareness and Training Program, Second Edition provides authoritative coverage of nearly everything needed to create an effective training program that is compliant with applicable laws, regulations, and policies. Written by Rebecca Herold, a well-respected information security and privacy expert named one of the "Best Privacy Advisers in the World" multiple times by Computerworld magazine as well as a "Top 13 Influencer in IT Security" by IT Security Magazine, the text supplies a proven framework for creating an awareness and training program. It also: Lists the laws and associated excerpts of the specific passages that require training and awareness Contains a plethora of forms, examples, and samples in the book’s 22 appendices Highlights common mistakes that many organizations make Directs readers to additional resources for more specialized information Includes 250 awareness activities ideas and 42 helpful tips for trainers Complete with case studies and examples from a range of businesses and industries, this all-in-one resource provides the holistic and practical understanding needed to identify and implement the training and awareness methods best suited to, and most effective for, your organization. Praise for: The first edition was outstanding. The new second edition is even better ... the definitive and indispensable guide for information security and privacy awareness and training professionals, worth every cent. As with the first edition, we recommend it unreservedly.. —NoticeBored.com


Managing an Information Security and Privacy Awareness and Training Program, Second Edition Related Books

Managing an Information Security and Privacy Awareness and Training Program, Second Edition
Language: en
Pages: 568
Authors: Rebecca Herold
Categories: Business & Economics
Type: BOOK - Published: 2010-08-24 - Publisher: CRC Press

DOWNLOAD EBOOK

Starting with the inception of an education program and progressing through its development, implementation, delivery, and evaluation, Managing an Information S
Privileged Attack Vectors
Language: en
Pages: 403
Authors: Morey J. Haber
Categories: Computers
Type: BOOK - Published: 2020-06-13 - Publisher: Apress

DOWNLOAD EBOOK

See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks c
Access Management Awareness Program
Language: en
Pages: 166
Authors: T. H. Maze
Categories: Driveways
Type: BOOK - Published: 1997 - Publisher:

DOWNLOAD EBOOK

This report presents the results of a number of detailed Iowa access management case studies. Case studies were selected to provide a cross-section of locations
Building an Information Security Awareness Program
Language: en
Pages: 214
Authors: Bill Gardner
Categories: Computers
Type: BOOK - Published: 2014-08-12 - Publisher: Elsevier

DOWNLOAD EBOOK

The best defense against the increasing threat of social engineering attacks is Security Awareness Training to warn your organization's staff of the risk and ed
Identity and Access Management
Language: en
Pages: 649
Authors: Ertem Osmanoglu
Categories: Computers
Type: BOOK - Published: 2013-11-19 - Publisher: Newnes

DOWNLOAD EBOOK

Identity and Access Management: Business Performance Through Connected Intelligence provides you with a practical, in-depth walkthrough of how to plan, assess,