Business Practical Security

by J. Brantley Briegel CISSP CISM CHSP


Formats

Softcover
$39.99
E-Book
$10.99
Softcover
$39.99

Book Details

Language : English
Publication Date : 2/7/2020

Format : Softcover
Dimensions : 8.25x11
Page Count : 468
ISBN : 9781532085802
Format : E-Book
Dimensions : N/A
Page Count : 468
ISBN : 9781532085819

About the Book

A complete and proven Information Security Program manual used by numerous organizations to apply practical security controls. The Business Practical Security manual has been customized and implemented in industries such as financial, legal, medical, government, engineering, manufacturing, education, religion, nonprofit, advertising, broadcasting, and more. The manual contains template policies, standards, guidelines, and risk management tools. The publication is not a read Front-to-Back book. It contains actual documents which have been successfully implemented and still in use today by numerous organizations. The manual is organized to facilitate an Information Security Program to achieve regulatory compliance such as Sarbanes-Oxley, HIPAA, GLBA, and PCI/DSS. Adherence to ISO/27000 and the National Institute of Standards Technology (NIST) has been applied. The publication interacts with business continuity and disaster recovery planning through a business impact assessment tool.


About the Author

J. Brantley Briegel has worked in the field of information security and technology for over twenty-five years. He is a Security Architect and has built successful security consulting practices within professional organizations. He has implemented formal information security programs in numerous organizations.

Through this published Business Practical Security program Brantley and his associates have:
- defined appropriate directives for executive approval
- performed security training for executive management, employees, & security administrators
- conducted ongoing security testing & assessments
- performed the defined security administrative processes

The integrated documents in this publication has evolved and been refined over two and a half decades of Real-World application.

If you are developing, accessing, or auditing your organization’s security posture, you have found the right resource.