Book description
Deploy information security across the business
Knowing about information security is not enough. You also have to deploy it across the business - which means convincing management of its importance. Learn how with this essential guide!
Information technology plays a fundamental role in the operations of any modern business. While the confidentiality and integrity of your organisation's information have to be protected, a business still needs to have this information readily available in order to be able to function from day to day. If you are an information security practitioner, you need to be able to sell complex and often technical solutions to boards and management teams.
Sell information security to the board
Persuading the board to invest in information security measures requires sales skills. As an information security professional, you are a scientific and technical specialist; and yet you need to get your message across to people whose primary interests lie elsewhere, in turnover and overall performance. In other words, you need to develop sales and marketing skills.
This pocket guide will help you with the essential sales skills that persuade company directors to commit money and resources to your information security initiatives.
How this book can help information security professionals:
- Understand basic sales techniques Find out what to do to capture the attention of management and win them over
- Understand how to present yourself Present yourself so that management takes you seriously, and ensure your proposal receives a proper hearing.
- Find out how to earn management's trust This guide shows you how to persuade management that you are the kind of information security professional who is interested in supporting, rather than impeding, business success.
- Learn how to craft a successful proposal This guide offers you invaluable tips on how to write a proposal that will communicate your ideas effectively to senior executives.
Table of contents
- Cover
- Title page
- Copyright
- Contents
- Introduction
- Chapter 1: Carelessness
- Chapter 2: Accidental Disclosure
- Chapter 3: People are Intelligent
- Chapter 4: An Aside: Password Policies
- Chapter 5: People are Helpful and Trusting
- Chapter 6: Harnessing Human Qualities to Improve Security
- Chapter 7: Why Raise Awareness?
- Chapter 8: Beyond Awareness
- Chapter 9: The Extended Enterprise
- Chapter 10: Process Design
- Chapter 11: Usability
- Chapter 12: And Finally
- ITG Resources
Product information
- Title: Security: The Human Factor
- Author(s):
- Release date: December 2010
- Publisher(s): IT Governance Publishing
- ISBN: 9781849281843
You might also like
book
Social Engineering in IT Security: Tools, Tactics, and Techniques
Cutting-edge social engineering testing techniques "Provides all of the core areas and nearly everything [you] need …
book
Cybersecurity Risk Management
Cybersecurity Risk Management In Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework, veteran …
book
Information Security Management Principles - Second edition
Commercial, personal and sensitive information is very hard to keep secure, and technological solutions are not …
book
The CERT® Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud)
Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has …