Unavailable
Unavailable
Unavailable
Ebook513 pages3 hours
Information security: Risk assessment; information security management systems; the ISO/IEC 27001 standard
Rating: 0 out of 5 stars
()
Currently unavailable
Currently unavailable
About this ebook
In this book, the following subjects are included: information security, the risk assessment and treatment processes (with practical examples), the information security controls.
The text is based on the ISO/IEC 27001 and ISO/IEC 27002 standards and on the discussions held during the editing meetings, attended by the author.
Appendixes include short presentations (on auditor managmeent, on ISO/IEC 27001 certifications, on Common Criteria and FIPS 140) and check lists (for change management and contracts).
This book is addressed to those who want to learn about and deepen their knowledge of information security. Many ideas may be of interest to those who already know the subject.
CESARE GALLOTTI
Cesare Gallotti has been working since 1999 in the information security and IT process management fields and has been leading many projects in Italy, Europe, Asia and Africa, for companies of various sizes and market sectors.
He has been leading projects as consultant or auditor for the compliance with ISO/IEC 27001, ISO 9001, ISO/IEC 20000 or ISO 22301 and has been designing and delivering ISO/IEC 27001, privacy and ITIL training courses.
Some of his certifications are: Lead Auditor ISO/IEC 27001, Lead Auditor 9001, CISA, ITIL Expert and CBCI, CIPP/e.
Since 2010, he has been Italian delegate for the ISO/IEC JTC 1 SC 27 WG 1, i.e. the editing group for the ISO/IEC 27000 standard family.
Web: www.cesaregallotti.it; Blog: blog.cesaregallotti.it
The text is based on the ISO/IEC 27001 and ISO/IEC 27002 standards and on the discussions held during the editing meetings, attended by the author.
Appendixes include short presentations (on auditor managmeent, on ISO/IEC 27001 certifications, on Common Criteria and FIPS 140) and check lists (for change management and contracts).
This book is addressed to those who want to learn about and deepen their knowledge of information security. Many ideas may be of interest to those who already know the subject.
CESARE GALLOTTI
Cesare Gallotti has been working since 1999 in the information security and IT process management fields and has been leading many projects in Italy, Europe, Asia and Africa, for companies of various sizes and market sectors.
He has been leading projects as consultant or auditor for the compliance with ISO/IEC 27001, ISO 9001, ISO/IEC 20000 or ISO 22301 and has been designing and delivering ISO/IEC 27001, privacy and ITIL training courses.
Some of his certifications are: Lead Auditor ISO/IEC 27001, Lead Auditor 9001, CISA, ITIL Expert and CBCI, CIPP/e.
Since 2010, he has been Italian delegate for the ISO/IEC JTC 1 SC 27 WG 1, i.e. the editing group for the ISO/IEC 27000 standard family.
Web: www.cesaregallotti.it; Blog: blog.cesaregallotti.it
Unavailable
Related to Information security
Related ebooks
Security Controls Evaluation, Testing, and Assessment Handbook Rating: 5 out of 5 stars5/5FISMA Compliance Handbook: Second Edition Rating: 5 out of 5 stars5/5PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance Rating: 5 out of 5 stars5/5Information Security Governance: A Practical Development and Implementation Approach Rating: 0 out of 5 stars0 ratingsThe Official (ISC)2 Guide to the CCSP CBK Rating: 0 out of 5 stars0 ratingsThe Cyber Security Handbook – Prepare for, respond to and recover from cyber attacks Rating: 0 out of 5 stars0 ratingsInfosec Management Fundamentals Rating: 5 out of 5 stars5/5Application Security in the ISO27001 Environment Rating: 0 out of 5 stars0 ratingsInformation Security Risk Management for ISO 27001/ISO 27002, third edition Rating: 4 out of 5 stars4/5ISO IEC 27001 Lead Implementer A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsThe True Cost of Information Security Breaches and Cyber Crime Rating: 0 out of 5 stars0 ratingsNine Steps to Success: North American edition: An ISO 27001 Implementation Overview Rating: 0 out of 5 stars0 ratingsFISMA and the Risk Management Framework: The New Practice of Federal Cyber Security Rating: 0 out of 5 stars0 ratingsISO IEC 27001 Lead Auditor A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsCRISC Standard Requirements Rating: 0 out of 5 stars0 ratingsSarbanes-Oxley Compliance Using COBIT and Open Source Tools Rating: 4 out of 5 stars4/5Information Security Risk Management for ISO27001/ISO27002 Rating: 4 out of 5 stars4/5ISO IEC 27001 A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsNine Steps to Success: An ISO27001:2013 Implementation Overview Rating: 1 out of 5 stars1/5ISO 27007 A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsISO27001/ISO27002:2013: A Pocket Guide Rating: 4 out of 5 stars4/5Risk Assessment for Asset Owners Rating: 4 out of 5 stars4/5The Case for ISO27001:2013 Rating: 1 out of 5 stars1/5Business Continuity and Disaster Recovery for InfoSec Managers Rating: 5 out of 5 stars5/5Security Metrics Management: Measuring the Effectiveness and Efficiency of a Security Program Rating: 0 out of 5 stars0 ratingsSecurity Awareness Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsCSA Guide to Cloud Computing: Implementing Cloud Privacy and Security Rating: 0 out of 5 stars0 ratingsSecurity Leader Insights for Risk Management: Lessons and Strategies from Leading Security Professionals Rating: 0 out of 5 stars0 ratings
Security For You
How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5Hacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsMike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5Dark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5Hacking For Dummies Rating: 4 out of 5 stars4/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5CompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsMake Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5CompTIA CySA+ Practice Tests: Exam CS0-002 Rating: 0 out of 5 stars0 ratingsUltimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Codes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsTor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5
Reviews for Information security
Rating: 0 out of 5 stars
0 ratings
0 ratings0 reviews