Building a Comprehensive IT Security Program

Practical Guidelines and Best Practices

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Building a Comprehensive IT Security Program by Jeremy Wittkop, Apress
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Jeremy Wittkop ISBN: 9781484220535
Publisher: Apress Publication: August 5, 2016
Imprint: Apress Language: English
Author: Jeremy Wittkop
ISBN: 9781484220535
Publisher: Apress
Publication: August 5, 2016
Imprint: Apress
Language: English

This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It clarifies the historical context of the current situation as it relates to cybersecurity, the challenges facing private business, and the fundamental changes organizations can make to better protect themselves. The problems we face are difficult, but they are not hopeless.

Cybercrime continues to grow at an astounding rate. With constant coverage of cyber-attacks in the media, there is no shortage of awareness of increasing threats. Budgets have increased and executives are implementing stronger defenses. Nonetheless, breaches continue to increase in frequency and scope.

*Building a Comprehensive IT Security Program *shares why organizations continue to fail to secure their critical information assets and explains the internal and external adversaries facing organizations today. This book supplies the necessary knowledge and skills to protect organizations better in the future by implementing a comprehensive approach to security.

Jeremy Wittkop’s security expertise and critical experience provides insights into topics such as:

  • Who is attempting to steal information and why?
  • What are critical information assets?
  • How are effective programs built?
  • How is stolen information capitalized?
  • How do we shift the paradigm to better protect our organizations?
  • How we can make the cyber world safer for everyone to do business?
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It clarifies the historical context of the current situation as it relates to cybersecurity, the challenges facing private business, and the fundamental changes organizations can make to better protect themselves. The problems we face are difficult, but they are not hopeless.

Cybercrime continues to grow at an astounding rate. With constant coverage of cyber-attacks in the media, there is no shortage of awareness of increasing threats. Budgets have increased and executives are implementing stronger defenses. Nonetheless, breaches continue to increase in frequency and scope.

*Building a Comprehensive IT Security Program *shares why organizations continue to fail to secure their critical information assets and explains the internal and external adversaries facing organizations today. This book supplies the necessary knowledge and skills to protect organizations better in the future by implementing a comprehensive approach to security.

Jeremy Wittkop’s security expertise and critical experience provides insights into topics such as:

More books from Apress

Cover of the book Expert Twisted by Jeremy Wittkop
Cover of the book Agile Performance Improvement by Jeremy Wittkop
Cover of the book Manager’s Guide to SharePoint Server 2016 by Jeremy Wittkop
Cover of the book MATLAB Linear Algebra by Jeremy Wittkop
Cover of the book Using Chef with Microsoft Azure by Jeremy Wittkop
Cover of the book Pro T-SQL Programmer's Guide by Jeremy Wittkop
Cover of the book Oracle WebLogic Server 12c Administration I Exam 1Z0-133 by Jeremy Wittkop
Cover of the book Industry 4.0 by Jeremy Wittkop
Cover of the book The Joys of Hashing by Jeremy Wittkop
Cover of the book Migrating to MariaDB by Jeremy Wittkop
Cover of the book Introduction to Deep Learning Business Applications for Developers by Jeremy Wittkop
Cover of the book Oracle Certified Professional Java SE 8 Programmer Exam 1Z0-809: A Comprehensive OCPJP 8 Certification Guide by Jeremy Wittkop
Cover of the book Oracle RMAN for Absolute Beginners by Jeremy Wittkop
Cover of the book Apache Solr by Jeremy Wittkop
Cover of the book Defending IoT Infrastructures with the Raspberry Pi by Jeremy Wittkop
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy