Nicht aus der Schweiz? Besuchen Sie lehmanns.de

Building a Comprehensive IT Security Program (eBook)

Practical Guidelines and Best Practices
eBook Download: PDF
2016 | 1st ed.
XIX, 195 Seiten
Apress (Verlag)
978-1-4842-2053-5 (ISBN)

Lese- und Medienproben

Building a Comprehensive IT Security Program -  Jeremy Wittkop
Systemvoraussetzungen
52,99 inkl. MwSt
(CHF 51,75)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It clarifies the historical context of the current situation as it relates to cybersecurity, the challenges facing private business, and the fundamental changes organizations can make to better protect themselves. The problems we face are difficult, but they are not hopeless.

Cybercrime continues to grow at an astounding rate. With constant coverage of cyber-attacks in the media, there is no shortage of awareness of increasing threats. Budgets have increased and executives are implementing stronger defenses. Nonetheless, breaches continue to increase in frequency and scope.

Building a Comprehensive IT Security Program shares why organizations continue to fail to secure their critical information assets and explains the internal and external adversaries facing organizations today. This book supplies the necessary knowledge and skills to protect organizations better in the future by implementing a comprehensive approach to security.

Jeremy Wittkop's security expertise and critical experience provides insights into topics such as:

  • Who is attempting to steal information and why?
  • What are critical information assets?
  • How are effective programs built?
  • How is stolen information capitalized?
  • How do we shift the paradigm to better protect our organizations?
  • How we can make the cyber world safer for everyone to do business?


Jeremy Wittkop is a leader in the information security industry, specifically as it relates to content and context protection.  Jeremy brings insights from a variety of industries including, military and defense, logistics, entertainment, as well as information security services.

Jeremy started with Intelisecure as the leader of the Managed Services department and has overseen 1000% growth of that department by helping to solve complex Information Security challenges for organizations spanning the globe. Jeremy now leads Intelisecure's Sales Engineering team, which is responsible for architecting solution packages that include creative approaches to people, process, and technology.


This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It clarifies the historical context of the current situation as it relates to cybersecurity, the challenges facing private business, and the fundamental changes organizations can make to better protect themselves. The problems we face are difficult, but they are not hopeless.Cybercrime continues to grow at an astounding rate. With constant coverage of cyber-attacks in the media, there is no shortage of awareness of increasing threats. Budgets have increased and executives are implementing stronger defenses. Nonetheless, breaches continue to increase in frequency and scope.Building a Comprehensive IT Security Program shares why organizations continue to fail to securetheir critical information assets and explains the internal and external adversaries facing organizations today. This book supplies the necessary knowledge and skills to protect organizations better in the future by implementing a comprehensive approach to security.Jeremy Wittkop's security expertise and critical experience provides insights into topics such as:Who is attempting to steal information and why?What are critical information assets?How are effective programs built?How is stolen information capitalized?How do we shift the paradigm to better protect our organizations?How we can make the cyber world safer for everyone to do business?

Jeremy Wittkop is a leader in the information security industry, specifically as it relates to content and context protection.  Jeremy brings insights from a variety of industries including, military and defense, logistics, entertainment, as well as information security services. Jeremy started with Intelisecure as the leader of the Managed Services department and has overseen 1000% growth of that department by helping to solve complex Information Security challenges for organizations spanning the globe. Jeremy now leads Intelisecure's Sales Engineering team, which is responsible for architecting solution packages that include creative approaches to people, process, and technology.

The Problem We Are FacingProtecting Critical AssetsMonetizing RiskSecurity Intelligence ModelIncident Response PlanningThe People ProblemAssigning AccountabilityShifting the ParadigmThe Definition of InsanityDéjà VuThe Information Security CommunityPartnering with Governments

Erscheint lt. Verlag 5.8.2016
Zusatzinfo XIX, 195 p. 13 illus., 8 illus. in color.
Verlagsort Berkeley
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Datenbanken
Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Algorithmen
Schlagworte cyber attacks • cyberecurity • data protection • Incident Response • information asset protection • Information Security • information security program • IT Security • security intelligence
ISBN-10 1-4842-2053-6 / 1484220536
ISBN-13 978-1-4842-2053-5 / 9781484220535
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 10,7 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das umfassende Handbuch

von Michael Kofler; Klaus Gebeshuber; Peter Kloep …

eBook Download (2022)
Rheinwerk Computing (Verlag)
CHF 48,75
Umfassendes Sicherheits-, Kontinuitäts- und Risikomanagement mit …

von Klaus-Rainer Müller

eBook Download (2023)
Springer Vieweg (Verlag)
CHF 78,15