IT Governance: Data Security and BS 7799/ISO 17799 - A Manager's Guide to Effective Information Security

IT Governance: Data Security and BS 7799/ISO 17799 - A Manager's Guide to Effective Information Security

by Alan Calder (Author)

Synopsis

It is reported that 60 per cent of organizations have suffered a data security breach in the past two years and 43 per cent of those that have sensitive or critical information have suffered an extremely serious one. With the growing importance of IT to both internal systems and external e-commerce, this may be alarming but perhaps not surprising. What is surprising is that, up until very recently, data security has been seen as the province of the IT department rather than, as it should be, a key board-room issue for the e-commerce age. The Turnbull report has focused interest in this issue by setting out how directors of listed companies must comply with the UK's Combined Code requirements in respect of internal controls including both financial, risk management and operational - specifically operational from an IT perspective. By underlining the importance of IT Governance as a critical aspect of Corporate Governance the report establishes best practice for any organization both public and private, large and small. The development of IT governance - which recognizes the convergence between business management and IT management - makes it essential for managers at all levels of the organization to adopt best practice in information security. By taking on BS 7799 or ISO 17799 organizations can be certain that they are doing this. This handbook guides managers through the maze of issues involved in effective information security management and shows how to introduce reliable management controls. In so doing, it also goes into detail through the process of achieving BS or ISO certification. It is a resource for directors and senior managers in organizations of all sorts and sizes but particularly those with well-developed internal IT systems and those focused on e-commerce. Coverage includes: why is information security necessary?; the Combined Code and the Turnbull Report; BS 7799 - Benefits of certification; information security management; information security policy and scope; the risk assessment and statement of applicability; security of third party access and outsourcing; asset classification and control; personnel security; physical and environmental security; equipment security; general security controls; communications and operations management; controls against malicious software (malware); and housekeeping, network management and media handling.

$38.60

Save:$90.76 (70%)

Quantity

1 in stock

More Information

Format: Hardcover
Pages: 352
Publisher: Kogan Page Ltd
Published: 28 Jun 2002

ISBN 10: 0749438452
ISBN 13: 9780749438456

Media Reviews
Companies across the USA, worried that cyberspace will be terrorism s next battleground, have shored up security since Sept.11. About 77% of businesses improved defenses against hackers, viruses and other attacks, says a survey of 233 corporations by Computer Economics. Such threats are real. Cyberspace attacks jumped 64% from a year ago. -- USA TODAY, August 19 2002
Author Bio
Alan Calder is CEO of Wide Learning, a supplier of e-learning, and was previously CEO of Focus Central London and, before that, of Business Link London City Partners (BLLCP). He was also a member of the DTI's Information Age Competitiveness Working Group. He is a non-executive director of DNV Certification Services Ltd, a company that certifies compliance with international standards including BS 7799. He is also a Director of IT Governance Ltd, which provides information security services through its web site at www.itgovernance.co.uk Steve Watkins is Corporate Services Manager of HMCPSI and was Head of Quality and Operations at Focus Central London and was, before that, Quality Manager at Business Link. The authors were responsible for one of the first companies (BLLCP) to achieve BS 7799 registration when the standard was first promulgated in 1996. They have aided other organizations since then to implement effective information security management systems, and have been involved in the development of both the accredited certification scheme and related training standards.