LEADER 02963oam 2200601I 450 001 9910786835803321 005 20170821193839.0 010 $a1-000-75567-3 010 $a0-429-07610-X 010 $a1-138-43683-6 010 $a1-4822-2008-3 024 7 $a10.1201/b16888 035 $a(CKB)3710000000108103 035 $a(EBL)1480384 035 $a(SSID)ssj0001196862 035 $a(PQKBManifestationID)11805574 035 $a(PQKBTitleCode)TC0001196862 035 $a(PQKBWorkID)11176881 035 $a(PQKB)11491865 035 $a(OCoLC)880455767 035 $a(MiAaPQ)EBC1480384 035 $a(CaSebORM)9781482220087 035 $a(EXLCZ)993710000000108103 100 $a20180331h20142014 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 14$aThe frugal CISO $eusing innovation and smart approaches to maximize your security posture /$fKerry Ann Anderson 205 $a1st edition 210 1$aBoca Raton, FL :$cCRC Press,$d[2014] 210 4$dİ2014 215 $a1 online resource (368 p.) 300 $aDescription based upon print version of record. 311 $a1-306-86655-3 311 $a1-4822-2007-5 327 $aFront Cover; Contents; About the Author; Introduction; Chapter 1: "New Normal"; Chapter 2: Information Security Maturity Life Cycle; Chapter 3: Reducing Complexity; Chapter 4: Frugal Hiring; Chapter 5: Frugal Team Management; Chapter 6: Managing External Parties Effectively; Chapter 7: Security Awareness : Fluff or Strategic Investment?; Chapter 8: Information Security Policies and Procedures; Chapter 9: "Is This Necessary?"; Chapter 10: Understand the Budgeting Cycle; Chapter 11: Using the Goldilocks Principle; Chapter 12: The Hybrid (Frugal) CISO 327 $aChapter 13: Frugality as a Continuing Strategy for Information Security ManagementBack Cover 330 $aIf you're an information security professional today, you are being forced to address growing cyber security threats and ever-evolving compliance requirements, while dealing with stagnant and decreasing budgets. The Frugal CISO: Using Innovation and Smart Approaches to Maximize Your Security Posture describes techniques you can immediately put to use to run an effective and efficient information-security management program in today's cost-cutting environment.The book outlines a strategy for managing the information security function in a manner that optimizes 606 $aInformation technology$xSecurity measures$xManagement 606 $aComputer security$xManagement 615 0$aInformation technology$xSecurity measures$xManagement. 615 0$aComputer security$xManagement. 676 $a658.4/78 676 $a658.478 700 $aAnderson$b Kerry Ann$01470400 801 0$bFlBoTFG 801 1$bFlBoTFG 906 $aBOOK 912 $a9910786835803321 996 $aThe frugal CISO$93682194 997 $aUNINA