The Frugal CISO: Using Innovation and Smart Approaches to Maximize Your Security Posture

Kerry Ann Anderson

May 19, 2014 by Auerbach Publications
Reference - 381 Pages - 4 B/W Illustrations
ISBN 9781482220070 - CAT# K22183

was $49.95

USD$39.96

SAVE ~$9.99

Add to Wish List
SAVE 25%
When you buy 2 or more print books!
See final price in shopping cart.
FREE Standard Shipping!

Features

  • Presents actionable information that information security practitioners can implement immediately
  • Provides real-world perspectives that reflect what information security practitioners face in running an enterprise’s security operations
  • Helps information security management and staff develop fiscal proficiency to navigate the annual budgeting process
  • Focuses on managing information security programs for long-term operational success in terms of efficiency, effectiveness, and budgeting savvy

Summary

If you’re an information security professional today, you are being forced to address growing cyber security threats and ever-evolving compliance requirements, while dealing with stagnant and decreasing budgets. The Frugal CISO: Using Innovation and Smart Approaches to Maximize Your Security Posture describes techniques you can immediately put to use to run an effective and efficient information-security management program in today’s cost-cutting environment.

The book outlines a strategy for managing the information security function in a manner that optimizes cost efficiency and results. This strategy is designed to work across a wide variety of business sectors and economic conditions and focuses on producing long-term results through investment in people and technology.

The text illustrates real-world perspectives that reflect the day-to-day issues that you face in running an enterprise’s security operations. Focused on managing information security programs for long-term operational success, in terms of efficiency, effectiveness, and budgeting ability, this book will help you develop the fiscal proficiency required to navigate the budgeting process.

After reading this book you will understand how to manage an information security program with a limited budget, while still maintaining an appropriate level of security controls and meeting compliance requirements. The concepts and methods identified in this book are applicable to a wide variation of teams, regardless of organizational size or budget.