Ebook150 pages2 hours
Agile Information Security: Using Scrum to Survive in and Secure a Rapidly Changing Environment
Rating: 0 out of 5 stars
()
About this ebook
In Agile Information Security, James Fitzer provides sound guidance and examples on working agility into your information security process, using Scrum as a framework, and lessons learned from the Northern Border Integration Demonstration, a high-profile U.S. Border Security project. You will find advice, examples, and team-building concepts designed to make your information security program more effective by trimming the fat from your security process and learning to thrive on change. More importantly, you'll find ways to return your information security program to the basics: protecting your organization's assets and supporting the enterprise. In a world of increasing bloat and bureaucracy, the simple approach to a "working product" is a welcome breath of fresh air.
Related to Agile Information Security
Related ebooks
Selling Information Security to the Board: A Primer Rating: 0 out of 5 stars0 ratingsInformation Security Breaches: Avoidance and Treatment based on ISO27001 Rating: 0 out of 5 stars0 ratingsInformation Governance and Security: Protecting and Managing Your Company’s Proprietary Information Rating: 0 out of 5 stars0 ratingsRisk Management Framework: A Lab-Based Approach to Securing Information Systems Rating: 2 out of 5 stars2/5I/T Architecture in Action Rating: 0 out of 5 stars0 ratingsManaging Information Security Breaches: Studies from real life Rating: 0 out of 5 stars0 ratingsFight Fire with Fire: Proactive Cybersecurity Strategies for Today's Leaders Rating: 0 out of 5 stars0 ratingsBuilding Effective Cybersecurity Programs: A Security Manager’s Handbook Rating: 4 out of 5 stars4/5Nine Steps to Success: An ISO27001:2013 Implementation Overview Rating: 1 out of 5 stars1/5Cyber Resilience: Defence-in-depth principles Rating: 0 out of 5 stars0 ratingsGovernance and Internal Controls for Cutting Edge IT Rating: 0 out of 5 stars0 ratingsInformation Security for Small and Midsized Businesses Rating: 0 out of 5 stars0 ratingsInformation Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data Analysis Rating: 0 out of 5 stars0 ratingsUltimate Splunk for Cybersecurity Rating: 0 out of 5 stars0 ratingsBuilding an Effective Cybersecurity Program, 2nd Edition Rating: 0 out of 5 stars0 ratingsAvailability and Capacity Management in the Cloud: An ITSM Narrative Account Rating: 0 out of 5 stars0 ratingsIT Induction and Information Security Awareness: A Pocket Guide Rating: 0 out of 5 stars0 ratingsThe Chief Information Security Officer: Insights, tools and survival skills Rating: 1 out of 5 stars1/5Executive's Guide to Cyber Risk: Securing the Future Today Rating: 0 out of 5 stars0 ratingsAssessing Vendors: A Hands-On Guide to Assessing Infosec and IT Vendors Rating: 0 out of 5 stars0 ratingsA Convenient Guide to Starting You on Threat Modeling Rating: 0 out of 5 stars0 ratingsManaging Cybersecurity Risk: Book 3 Rating: 0 out of 5 stars0 ratingsCybersecurity and Third-Party Risk: Third Party Threat Hunting Rating: 0 out of 5 stars0 ratingsA concise introduction to the NIS Directive: A pocket guide for digital service providers Rating: 0 out of 5 stars0 ratingsCyber-security regulation Third Edition Rating: 0 out of 5 stars0 ratingsCOBIT 5 A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsBusiness Continuity Management Systems: Implementation and certification to ISO 22301 Rating: 0 out of 5 stars0 ratingsIT GRC A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsMaking It Happen Rating: 0 out of 5 stars0 ratingsInformation Security Governance: A Practical Development and Implementation Approach Rating: 0 out of 5 stars0 ratings
Security For You
How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5Hacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsMike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5Dark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5Hacking For Dummies Rating: 4 out of 5 stars4/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5CompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsMake Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5CompTIA CySA+ Practice Tests: Exam CS0-002 Rating: 0 out of 5 stars0 ratingsUltimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Codes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsTor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5
Reviews for Agile Information Security
Rating: 0 out of 5 stars
0 ratings
0 ratings0 reviews
Book preview
Agile Information Security - James R. Fitzer
01^ book_preview_excerpt.html Zێ!O^wk;H`&H#[bDo$OyͧKrNI/ c{$Xuԩbߌ^|Q|:ތ_w7?Tۛ8?ool{?7s=9?|si|v~USkuvW5nsM7|,m=7`9,<6XT3CmDRfh*7]|QuV0fæMh Gs^v㪓qs}цvb#Kcl_waX~
kVG;a&lqmOYW<4p|]k"W}4+w<-w~ab!]#v`SB=\6mbC`^!rg'BrIE#<̓7>{t
m:%$f֧ja+6aV3Cv$qjkO~vvb!LmV8 "}zn
ר'<8 C5]Hƒ?Onwpd^'烝0Зs-Yd6 Tjl]je|4i샦Γ²8=5LluH28UYcy]~[б0ɆzQzkIaSqp'oug̮:h9g[?wMlֳO KY&\){Sf fy^˯DΑ6 $?D',X>)x''U,Nk3&'eյ?n*y+Hj@Jyqm~q{1|'`[W^9D{*LYk[q!6;5JlHd[a>ˤ5_J)3`SL[S (EeŊNuE۷`G-^dR<`;F!hc&~')Vlmy-;Kaz?㩞0ebpItJ!̄_QF}sO/[|2sMնf[!Jꫳo,@HSձOiVnب@=* sS.˙0x%Ң[Bo3|ӣT^ VXvЃ=N;OgyIJmEݙؖU`*6Q