Custom cover image
Custom cover image

Developing Cybersecurity Programs and Policies

By: Material type: TextTextLanguage: English Series: Pearson IT Cybersecurity CurriculumPublication details: London : Pearson Education, c2019Description: xvi, 656 p. : illISBN:
  • 9780789759405
Subject(s): DDC classification:
  • 005.8 SAN
Online resources: Summary: SUMMARY The in-depth, up-to-the-minute guide to information security policy for every practitioner and advanced student In-depth coverage of information security policy from definition, psychology, standard frameworks, and creating a culture of compliance Thorough coverage of Security Education, Training & Awareness (SETA) Appendices include: Employee Affirmation Statement and Resources for Security Professionals
Holdings
Item type Current library Collection Shelving location Call number Copy number Status Date due Barcode
Reference Collection Reference Collection TIEST (Thar) Library Engr Abul Kalam Library Computer Science & Information Technology - Thar Institute 005.8 SAN 2023-24 Available 98607

Omar Santos the Author
is a principal engineer in the Cisco Product Security Incident Response Team (PSIRT) within the Cisco Security Research and Operations. He mentors and leads engineers and incident managers during the investigation and resolution of security vulnerabilities in all Cisco products, including cloud services. Omar has been working with information technology and cybersecurity since the mid-1990s. Omar has designed, implemented, and supported numerous secure networks for Fortune 100 and 500 companies and the U.S. government. Prior to his current role, he was a technical leader within the World-Wide Security Practice and the Cisco Technical Assistance Center (TAC), where he taught, led, and mentored many engineers within both organizations.

Omar is an active member of the security community, where he leads several industrywide initiatives and standard bodies. His active role helps businesses, academic institutions, state and local law enforcement agencies, and other participants that are dedicated to increasing the security of the critical infrastructure.

SUMMARY

The in-depth, up-to-the-minute guide to information security policy for every practitioner and advanced student
In-depth coverage of information security policy from definition, psychology, standard frameworks, and creating a culture of compliance
Thorough coverage of Security Education, Training & Awareness (SETA)
Appendices include: Employee Affirmation Statement and Resources for Security Professionals