Unavailable
Unavailable
Unavailable
Ebook513 pages3 hours
Information security: Risk assessment; information security management systems; the ISO/IEC 27001 standard
Rating: 0 out of 5 stars
()
Currently unavailable
Currently unavailable
About this ebook
In this book, the following subjects are included: information security, the risk assessment and treatment processes (with practical examples), the information security controls.
The text is based on the ISO/IEC 27001 and ISO/IEC 27002 standards and on the discussions held during the editing meetings, attended by the author.
Appendixes include short presentations (on auditor managmeent, on ISO/IEC 27001 certifications, on Common Criteria and FIPS 140) and check lists (for change management and contracts).
This book is addressed to those who want to learn about and deepen their knowledge of information security. Many ideas may be of interest to those who already know the subject.
CESARE GALLOTTI
Cesare Gallotti has been working since 1999 in the information security and IT process management fields and has been leading many projects in Italy, Europe, Asia and Africa, for companies of various sizes and market sectors.
He has been leading projects as consultant or auditor for the compliance with ISO/IEC 27001, ISO 9001, ISO/IEC 20000 or ISO 22301 and has been designing and delivering ISO/IEC 27001, privacy and ITIL training courses.
Some of his certifications are: Lead Auditor ISO/IEC 27001, Lead Auditor 9001, CISA, ITIL Expert and CBCI, CIPP/e.
Since 2010, he has been Italian delegate for the ISO/IEC JTC 1 SC 27 WG 1, i.e. the editing group for the ISO/IEC 27000 standard family.
Web: www.cesaregallotti.it; Blog: blog.cesaregallotti.it
The text is based on the ISO/IEC 27001 and ISO/IEC 27002 standards and on the discussions held during the editing meetings, attended by the author.
Appendixes include short presentations (on auditor managmeent, on ISO/IEC 27001 certifications, on Common Criteria and FIPS 140) and check lists (for change management and contracts).
This book is addressed to those who want to learn about and deepen their knowledge of information security. Many ideas may be of interest to those who already know the subject.
CESARE GALLOTTI
Cesare Gallotti has been working since 1999 in the information security and IT process management fields and has been leading many projects in Italy, Europe, Asia and Africa, for companies of various sizes and market sectors.
He has been leading projects as consultant or auditor for the compliance with ISO/IEC 27001, ISO 9001, ISO/IEC 20000 or ISO 22301 and has been designing and delivering ISO/IEC 27001, privacy and ITIL training courses.
Some of his certifications are: Lead Auditor ISO/IEC 27001, Lead Auditor 9001, CISA, ITIL Expert and CBCI, CIPP/e.
Since 2010, he has been Italian delegate for the ISO/IEC JTC 1 SC 27 WG 1, i.e. the editing group for the ISO/IEC 27000 standard family.
Web: www.cesaregallotti.it; Blog: blog.cesaregallotti.it
Unavailable
Related to Information security
Related ebooks
Security Controls Evaluation, Testing, and Assessment Handbook Rating: 5 out of 5 stars5/5The Official (ISC)2 Guide to the CCSP CBK Rating: 0 out of 5 stars0 ratingsManaging Information Security Rating: 5 out of 5 stars5/5Information Security Governance: A Practical Development and Implementation Approach Rating: 0 out of 5 stars0 ratingsPCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance Rating: 5 out of 5 stars5/5FISMA Compliance Handbook: Second Edition Rating: 5 out of 5 stars5/5Information Security Risk Management for ISO27001/ISO27002 Rating: 4 out of 5 stars4/5Infosec Management Fundamentals Rating: 5 out of 5 stars5/5ISO IEC 27001 Lead Implementer A Clear and Concise Reference Rating: 0 out of 5 stars0 ratingsInformation Security Risk Management for ISO 27001/ISO 27002, third edition Rating: 4 out of 5 stars4/5Cyber Security Risk Management A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsAn Introduction to Information Security and ISO27001:2013: A Pocket Guide Rating: 4 out of 5 stars4/5The True Cost of Information Security Breaches and Cyber Crime Rating: 0 out of 5 stars0 ratingsSecurity Leader Insights for Risk Management: Lessons and Strategies from Leading Security Professionals Rating: 0 out of 5 stars0 ratingsISO 27005 A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsApplication Security in the ISO27001 Environment Rating: 0 out of 5 stars0 ratingsCyber-security regulation Third Edition Rating: 0 out of 5 stars0 ratingsISO27001/ISO27002:2013: A Pocket Guide Rating: 4 out of 5 stars4/5CISA A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsRisk Assessment for Asset Owners Rating: 4 out of 5 stars4/5The Psychology of Information Security: Resolving conflicts between security compliance and human behaviour Rating: 5 out of 5 stars5/5The Manager’s Guide to Enterprise Security Risk Management: Essentials of Risk-Based Security Rating: 0 out of 5 stars0 ratingsManaging Information Security Breaches: Studies from real life Rating: 0 out of 5 stars0 ratingsCybersecurity Risk Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsISO IEC 27001 Lead Auditor A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsThreat model A Complete Guide Rating: 5 out of 5 stars5/5
Security For You
Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Hacking for Beginners: Mastery Guide to Learn and Practice the Basics of Computer and Cyber Security Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5How to Hack Like a GOD: Master the secrets of hacking through real-life hacking scenarios Rating: 4 out of 5 stars4/5Practical Ethical Hacking from Scratch Rating: 5 out of 5 stars5/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5Ultimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Hacking For Dummies Rating: 4 out of 5 stars4/5Game Console Hacking: Xbox, PlayStation, Nintendo, Game Boy, Atari and Sega Rating: 0 out of 5 stars0 ratingsCompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsAmazon Web Services (AWS) Interview Questions and Answers Rating: 5 out of 5 stars5/5IAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsHow to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Codes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5CompTIA CySA+ Practice Tests: Exam CS0-002 Rating: 0 out of 5 stars0 ratingsSocial Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Security+ Boot Camp Study Guide Rating: 5 out of 5 stars5/5
Reviews for Information security
Rating: 0 out of 5 stars
0 ratings
0 ratings0 reviews