Advertisement

Building a Comprehensive IT Security Program

Practical Guidelines and Best Practices

  • Jeremy Wittkop

Table of contents

  1. Front Matter
    Pages i-xix
  2. Jeremy Wittkop
    Pages 1-20
  3. Jeremy Wittkop
    Pages 21-39
  4. Jeremy Wittkop
    Pages 41-53
  5. Jeremy Wittkop
    Pages 55-72
  6. Jeremy Wittkop
    Pages 73-87
  7. Jeremy Wittkop
    Pages 89-105
  8. Jeremy Wittkop
    Pages 107-120
  9. Jeremy Wittkop
    Pages 121-136
  10. Jeremy Wittkop
    Pages 137-152
  11. Jeremy Wittkop
    Pages 153-165
  12. Jeremy Wittkop
    Pages 167-176
  13. Jeremy Wittkop
    Pages 177-188
  14. Back Matter
    Pages 189-195

About this book

Introduction

This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake.  It clarifies the historical context of the current situation as it relates to cybersecurity, the challenges facing private business, and the fundamental changes organizations can make to better protect themselves.  The problems we face are difficult, but they are not hopeless.

Cybercrime continues to grow at an astounding rate. With constant coverage of cyber-attacks in the media, there is no shortage of awareness of increasing threats. Budgets have increased and executives are implementing stronger defenses. Nonetheless, breaches continue to increase in frequency and scope.

Building a Comprehensive IT Security Program shares why organizations continue to fail to secure their critical information assets and explains the internal and external adversaries facing organizations today. This book supplies the necessary knowledge and skills to protect organizations better in the future by implementing a comprehensive approach to security.

Jeremy Wittkop’s security expertise and critical experience provides insights into topics such as:

  • Who is attempting to steal information and why?
  • What are critical information assets?
  • How are effective programs built?
  • How is stolen information capitalized?
  • How do we shift the paradigm to better protect our organizations?
  • How we can make the cyber world safer for everyone to do business?
  • Keywords

    cyberecurity cyber attacks IT security data protection information security incident response security intelligence information asset protection information security program

    Authors and affiliations

    • Jeremy Wittkop
      • 1
    1. 1.BoulderUSA

    Bibliographic information

    Industry Sectors
    Pharma
    Automotive
    Chemical Manufacturing
    Biotechnology
    Finance, Business & Banking
    Electronics
    IT & Software
    Telecommunications
    Consumer Packaged Goods
    Energy, Utilities & Environment
    Aerospace
    Engineering