LEADER 03123nam 2200469 450 001 9910698221403321 005 20230308050944.0 035 $a(CKB)2430000000035959 035 $a(NjHacI)992430000000035959 035 $a(OCoLC)84734928 035 $a(EXLCZ)992430000000035959 100 $a20230308d2009 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation security guide for government executives /$fPauline Bowen, Elizabeth Chew Bennett, Joan Hash 210 1$aGaithersburg, Md. :$cNational Institute of Standards and Technology,$d2009. 215 $a1 online resource (14 pages) 225 0 $aNISTIR 300 $aTitle from title screen (viewed on Feb. 20, 2007). 300 $a"January 2007." 330 $aInformation Security Guide for Government Executives provides a broad overview of information security program concepts to assist senior leaders in understanding how to oversee and support the development and implementation of information security programs. Management is responsible for: (1) Establishing the organization's information security program; (2) Setting program goals and priorities that support the mission of the organization; and (3) Making sure resources are available to support the security program and make it successful. Senior leadership commitment to security is more important now than ever before. Studies have shown that senior management's commitment to information security initiatives is the number one critical element that impacts an information security program's success. Meeting this need necessitates senior leadership to focus on effective information security governance and support which requires integration of security into the strategic and daily operations of an organization. When considering this challenge, five key security questions emerge for the executive: (1) What are the information security laws, regulations, standards, and guidance that I need to understand to build an effective security program? (2) What are the key activities to build an effective security program? (3) Why do I need to invest in security? (4) Where do I need to focus my attention in accomplishing critical security goals? (5) Where can I learn more to assist me in evaluating the effectiveness of my security program? This guide provides the answers to those questions. 606 $aGovernment executives 606 $aInformation technology 606 $aComputer security$zUnited States 608 $aHandbooks and manuals.$2lcgft 615 0$aGovernment executives. 615 0$aInformation technology. 615 0$aComputer security 676 $a351.0074 700 $aBowen$b Pauline$01351624 702 $aBennett$b Elizabeth Chew$f1922- 702 $aHash$b Joan 712 02$aNational Institute of Standards and Technology (U.S.) 801 0$bNjHacI 801 1$bNjHacl 906 $aBOOK 912 $a9910698221403321 996 $aInformation security guide for government executives$93152835 997 $aUNINA