This book begins with a review of the framework-based approach for implementing an information security program.
Information security management system; ISMS; Control Objectives for Information Technology; COBIT
This book has been developed after gaining years of experience in a variety of IT and information security positions.
I progressed in my career from a level one (entry level) service desk employee to the CTO and Principal Security Consultant at a small information security consulting shop. In that time, in every role and position that I’ve worked in, the answers to my client’s information security questions weren’t instantly solved by the latest and greatest security tools; even in light of the latest attacks ...