Jump to ratings and reviews
Rate this book

Security Program and Policies: Principles and Practices

Rate this book
Everything you need to know about information security programs and policies, in one book In today’s dangerous world, failures in information security can be catastrophic. Organizations must protect themselves. Protection begins with comprehensive, realistic policies. This up-to-date guide will help you create, deploy, and manage them. Complete and easy to understand, it explains key concepts and techniques through real-life examples. You’ll master modern information security regulations and frameworks, and learn specific best-practice policies for key industry sectors, including finance, healthcare, online commerce, and small business. If you understand basic information security, you’re ready to succeed with this book. You’ll find projects, questions, exercises, examples, links to valuable easy-to-adapt information security policies...everything you need to implement a successful information security program. Sari Stern Greene, CISSP, CRISC, CISM, NSA/IAM, is an information security practitioner, author, and entrepreneur. She is passionate about the importance of protecting information and critical infrastructure. Sari founded Sage Data Security in 2002 and has amassed thousands of hours in the field working with a spectrum of technical, operational, and management personnel, as well as boards of directors, regulators, and service providers. Her first text was Tools and Techniques for Securing Microsoft Networks , commissioned by Microsoft to train its partner channel, which was soon followed by the first edition of Security Policies and Principles and Practices . She is actively involved in the security community, and speaks regularly at security conferences and workshops. She has been quoted in The New York Times , Wall Street Journal , and on CNN, and CNBC. Since 2010, Sari has served as the chair of the annual Cybercrime Symposium. Learn how to · Establish program objectives, elements, domains, and governance · Understand policies, standards, procedures, guidelines, and plans―and the differences among them · Write policies in “plain language,” with the right level of detail · Apply the Confidentiality, Integrity & Availability (CIA) security model · Use NIST resources and ISO/IEC 27000-series standards · Align security with business strategy · Define, inventory, and classify your information and systems · Systematically identify, prioritize, and manage InfoSec risks · Reduce “people-related” risks with role-based Security Education, Awareness, and Training (SETA) · Implement effective physical, environmental, communications, and operational security · Effectively manage access control · Secure the entire system development lifecycle · Respond to incidents and ensure continuity of operations · Comply with laws and regulations, including GLBA, HIPAA/HITECH, FISMA, state data security and notification rules, and PCI DSS

648 pages, Paperback

First published July 28, 2005

5 people are currently reading
49 people want to read

About the author

Sari Stern Greene

3 books1 follower

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
9 (29%)
4 stars
13 (41%)
3 stars
6 (19%)
2 stars
2 (6%)
1 star
1 (3%)
Displaying 1 - 2 of 2 reviews
Profile Image for Kevin.
691 reviews10 followers
December 18, 2016
A very useful reference book. All sound security concepts. Was occassionally a bit to high level at times. Four stars, not because I was engrossed in it, but because it has practical and applicable information. Obviously written by someone familiar with policy and procedure document authoring because she started off by discussing definitions for each topic. One of the appendices should be extremely valuable going forward, the sample policies. Good stuff.
Profile Image for Thomas.
13 reviews13 followers
October 14, 2010
This is the best book I've seen yet on how-to write policies and procedures. If your starting at group zero building your security program this book can help you get started on the right foot.
Displaying 1 - 2 of 2 reviews

Can't find what you're looking for?

Get help and learn more about the design.