Table of Contents |
| The Information Systems Security Officer's Guide—Establishing and Managing an Information Protection Program, Second Edition |
| Preface |
| Introduction |
| Section I - The Working Environment of an ISSO |
| Chapter 1 | - | Understanding the Information World Environment |
| Chapter 2 | - | Understanding the Business and Management Environment |
| Chapter 3 | - | Understanding Today's Threats to Information Assets |
| Chapter 4 | - | The International Widget Corporation (IWC) |
| Section II - The Duties and Responsibilities of an ISSO |
| Chapter 5 | - | The ISSO's Position, Duties, and Responsibilities |
| Chapter 6 | - | The Infosec Strategic, Tactical, and Annual Plans |
| Chapter 7 | - | Establishing a CIAPP and Infosec Organization |
| Chapter 8 | - | Determining and Establishing InfoSec Functions |
| Chapter 9 | - | Establishing a Metrics Management System |
| Chapter 10 | - | Annual Reevaluation and Future Plans |
| Chapter 11 | - | High-Technology Crimes Investigative Support |
| Chapter 12 | - | InfoSec in the Interest of National Security |
| Section III - The Global, Professional, and Personal Challenges of an ISSO |
| Chapter 13 | - | The Related World of Information Warfare, Information Operations, and Information Assurance |
| Chapter 14 | - | The ISSO and Ethical Conduct |
| Chapter 15 | - | ISSO Career Development |
| Chapter 16 | - | How to Market Yourself as an ISSO |
| Chapter 17 | - | So, Are You Ready to Become an InfoSec Consultant? |
| Chapter 18 | - | 21st-century Challenges for the ISSO |
| Index |
| List of Figures |
| List of Case Studies |
| List of Sidebars |