Skip to content Skip to sidebar Skip to footer
information-security-policies-roles-and-responsibilities-made-easy-rothstein-publishing

Information Security Policies, Roles, Responsibilities Made Easy: SPECIAL OFFER

Information Security Policies Made Easy is the “gold standard” information security policy template library, with over 1500 pre-written information security policies covering over 200 security topics. Based on the 25 year consulting experience of Charles Cresson Wood, CISSP, CISA, it is the most widely used policy library in the world, with over 10,000 customers in 60 countries. Take the work out of creating, writing, and implementing security policies.Information Security Roles and Responsibilities Made Easy by security expert Charles Cresson Wood, provides over 70 pre-written job descriptions, mission statements, and organization charts that you can easily customize for your own organization.

Read More

cybersecurity-program-security-manager-handbook-rothstein-publishing

Is YOUR CyberSecurity Program Up to the Challenge?

What about the legal aspects of cybersecurity? ARE YOU AT RISK?

With critical information assets at risk, your company requires a state-of-the-art cybersecurity program. But how do you achieve the best possible program? Tari Schreider, in Building Effective Cybersecurity Programs: A Security Manager’s Handbook, lays out the step-by-step roadmap to follow as you build or enhance your cybersecurity program. Building Effective Cybersecurity Programs: A Security Manager’s Handbook is organized around the six main steps on the roadmap that will put your cybersecurity program in place:
  1. Design a Cybersecurity Program.
  2. Establish a Foundation of Governance.
  3. Build a Threat, Vulnerability Detection, and Intelligence Capability.
  4. Build a Cyber Risk Management Capability.
  5. Implement a Defense-in-Depth Strategy.
  6. Apply Service Management to Cybersecurity Programs.

Read More

Don’t WannaCry? Cyber Security Starts With Sound Information Security Policies

We all know we need to update our software, backup our critical data, install and maintain antimalware software and firewalls, manage robust contingency and recovery plans, not open funky emails, audit everything, blah blah blah. So what's wrong with us? Why don't we all do these things consistently? I'd like to think that everything we have been lectured, reminded, scolded, chastised, and even ridiculed about in the way of protecting our digital assets is doable and reasonable, but face it – sometimes it's not. Costs, number of hours in the day, distractions, urgent priorities, sleep, other crises, get in the way. Or, to put it simply, we get lazy or "have better things to do."

Read More

information-security-policies-made-easy-rothstein-publishing

Information Security Policies Made Easy

Information Security Policies Made Easy is the “gold standard” information security policy template library, with over 1500 pre-written information security policies covering 200+ security topics. Based on the 25 year consulting experience of Charles Cresson Wood, CISSP, CISA, it is the most widely used policy library in the world, with 10,000+ customers in 60 countries. Take the work out of creating, writing, and implementing security policies. Information Security Policies Made Easy has everything you need to build a robust security policy program, delivered by electronic download.

Read More

Information Security Policies Made Easy

Information Security Policies Made Easy

Information Security Policies Made Easy is the “gold standard” information security policy template library, with over 1500 pre-written information security policies covering over 200 security topics. Based on the 25 year consulting experience of Charles Cresson Wood, CISSP, CISA, it is the most widely used policy library in the world, with over 10,000 customers in 60 countries. Take the work out of creating, writing, and implementing security policies. Information Security Policies Made Easy has everything you need to build a robust security policy program.

Read More