Auditing Information and Cyber Security Governance Auditing Information and Cyber Security Governance
Security, Audit and Leadership Series

Auditing Information and Cyber Security Governance

A Controls-Based Approach

    • $59.99
    • $59.99

Publisher Description

"A much-needed service for society today. I hope this book reaches information managers in the organization now vulnerable to hacks that are stealing corporate information and even holding it hostage for ransom."

– Ronald W. Hull, author, poet, and former professor and university administrator

A comprehensive entity security program deploys information asset protection through stratified technological and non-technological controls. Controls are necessary for counteracting threats, opportunities, and vulnerabilities risks in a manner that reduces potential adverse effects to defined, acceptable levels. This book presents a methodological approach in the context of normative decision theory constructs and concepts with appropriate reference to standards and the respective guidelines. Normative decision theory attempts to establish a rational framework for choosing between alternative courses of action when the outcomes resulting from the selection are uncertain. Through the methodological application, decision theory techniques can provide objectives determination, interaction assessments, performance estimates, and organizational analysis. A normative model prescribes what should exist according to an assumption or rule.

GENRE
Business & Personal Finance
RELEASED
2021
September 22
LANGUAGE
EN
English
LENGTH
298
Pages
PUBLISHER
CRC Press
SELLER
Taylor & Francis Group
SIZE
8.4
MB
IT Governance and Information Security IT Governance and Information Security
2021
Information Security Governance Information Security Governance
2018
Strong Security Governance through Integration and Automation Strong Security Governance through Integration and Automation
2021
Information Security Governance Information Security Governance
2008
Optimal Spending on Cybersecurity Measures Optimal Spending on Cybersecurity Measures
2021
Responsive Security Responsive Security
2017
Information Systems Auditing: The IS Audit Follow-up Process Information Systems Auditing: The IS Audit Follow-up Process
2011
IT Auditing: An Adaptive Process IT Auditing: An Adaptive Process
2011
Information Systems Auditing: The IS Audit Study and Evaluation of Controls Process Information Systems Auditing: The IS Audit Study and Evaluation of Controls Process
2011
Assuring IT Governance Assuring IT Governance
2011
Information Systems Auditing: The IS Audit Testing Process Information Systems Auditing: The IS Audit Testing Process
2011
Ensuring Information Assets Protection Ensuring Information Assets Protection
2011
The CISO Playbook The CISO Playbook
2024
A Cybersecurity Leader's Journey A Cybersecurity Leader's Journey
2025
Cyber Risk Management in Practice Cyber Risk Management in Practice
2025
The Expert in the Next Office The Expert in the Next Office
2024
Riding the Wave Riding the Wave
2024
Cognitive Hack Cognitive Hack
2017