Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions

Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions

Indexed In: SCOPUS View 1 More Indices
Release Date: February, 2012|Copyright: © 2012 |Pages: 491
DOI: 10.4018/978-1-4666-0197-0
ISBN13: 9781466601970|ISBN10: 1466601973|EISBN13: 9781466601987
Hardcover:
Available
$195.00
TOTAL SAVINGS: $195.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Hardcover:
Available
$195.00
TOTAL SAVINGS: $195.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
Available
$195.00
TOTAL SAVINGS: $195.00
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
E-Book:
Available
$195.00
TOTAL SAVINGS: $195.00
Benefits
  • Immediate access after purchase
  • No DRM
  • PDF download
  • Receive a 10% Discount on eBooks
Hardcover +
E-Book:
Available
$235.00
TOTAL SAVINGS: $235.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
Hardcover +
E-Book:
Available
$235.00
TOTAL SAVINGS: $235.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Immediate access after purchase
  • No DRM
  • PDF download
Article Processing Charge:
Available
$700.00
TOTAL SAVINGS: $700.00
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Description & Coverage
Description:

Organizations, worldwide, have adopted practical and applied approaches for mitigating risks and managing information security program. Considering complexities of a large-scale, distributed IT environments, security should be proactively planned for and prepared ahead, rather than as used as reactions to changes in the landscape.

Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions presents high-quality research papers and practice articles on management and governance issues in the field of information security. The main focus of the book is to provide an organization with insights into practical and applied solutions, frameworks, technologies and practices on technological and organizational factors. The book aims to be a collection of knowledge for professionals, scholars, researchers and academicians working in this field that is fast evolving and growing as an area of information assurance.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Access Control Methods and Models
  • Data Loss Prevention Approaches and Enforcement Policies
  • Forensics and Investigation Issues
  • Fraud and Identity Theft Issues
  • Identification and Authentication Technologies
  • Information Security Governance Frameworks
  • Information Security Management Frameworks
  • Legal and Regulatory Oversight Issues
  • Security Auditing and Accountability Issues
  • Storage and Device Security
Reviews & Statements

The editors anticipate huge response from information security community due to practicality and applicability of issues and solutions that are included in the book.

– Manish Gupta, State University of New York at Buffalo, USA; John Walp, M&T Bank Corporation, USA; and Raj Sharman, State University of New York, USA
Table of Contents
Search this Book:
Reset
Editor/Author Biographies
Manish Gupta is an Information Security Professional in a Northeast based bank in US. He was an Adjunct Instructor/Professor (2007) at State University of New York at Buffalo, USA. He received his PhD in Management Science and Systems and an MBA in Information Systems and Finance from State University of New York, Buffalo, NY, USA in 2011 and 2003, respectively. He received his Bachelor’s degree in Mechanical Engineering from Institute of Engineering and Technology, Lucknow, India in 1998. He has more than twelve years of experience in information systems, security policies, and technologies. He has published 4 books in the area of information security, ethics, and assurance. He has published more than 50 research articles in leading journals, conference proceedings, and books including DSS, ACM Transactions, IEEE, and JOEUC. He serves in editorial boards of several international journals including Journal of Electronic Banking and International Journal of Liability and Scientific Enquiry (IJLSE), and has served in program committees of several international conferences. He holds several professional designations including CISSP, CISA, CISM, ISSPCS, CIW Security Analyst, and PMP. He is a member of Sigma Xi, Beta Gamma Sigma, ISACA, and ISC2. He received prestigious 2008 ISC2 information security scholarship (awarded on to only 7 researchers around the world) from ISC2 and also received PhD Student Achievement Award from SUNY Buffalo.
John Walp has more than 17 years of Information Technology experience, more than half of which has been focused on information security challenges. He currently serves as Administrative Vice President and Corporate Information Security Officer for M&T Bank, a $70 billion financial institution headquartered in Buffalo, NY. Previously, he held the role of Vice President, Network Security Solutions Manager for M&T. His responsibilities include forming and executing the overall strategy for Information Security and Privacy at M&T Bank. This includes groups which focus on external and internal network security, which are made up of key security systems such as firewalls, intrusion detection/prevention systems, and security information management platforms. In addition, his organization supports the functions of access management, and compliance and risk management. Mr. Walp was selected as the 2009 North East Information Security Executive of the Year, an honor given by the Executive Alliance. The ISE Northeast Awards recognize information security executives and their teams who demonstrate outstanding leadership in risk management, data asset protection, regulatory compliance, privacy, and network security across the region including the states of Connecticut, Maine, Massachusetts, New Hampshire, New Jersey, New York, Rhode Island, and Vermont. John is a Certified Information Systems Security Professional (CISSP) as well as a Certified Information Security Manager (CISM). He is a graduate of the FBI Citizens Academy and serves as Executive Vice President of the FBI’s Buffalo InfraGard Membership Alliance. Mr. Walp also serves on the advisory board of the Center of Excellence in Information Systems Assurance Research and Education (CEISARE) at the University of Buffalo. He is a member of the High-Tech Crime Consortium and the U.S. Secret Services Electronic Crimes Task Force. A Veteran of the United State Air Force, he served his country for 22 years which included both active and reserve service. In 2004, Mr. Walp was recalled to active duty and deployed to the Kingdom of Kuwait in support of Operation Iraqi Freedom and Operation Enduring Freedom. He was selected as part of an elite logistics cadre to aid in establishing the Central Command’s Deployment and Distribution Operations Center. He holds a Bachelor of Science in Computer Information Systems from State University of New York College at Buffalo. He and his wife Laurie have four children and make their home in Amherst, NY.
Raj Sharman is an associate professor in the Management Science and Systems Department at SUNY Buffalo, NY. He received his B. Tech and M. Tech degree from IIT Bombay (India) and his M.S degree in Industrial Engineering and PhD in Computer Science from Louisiana State University. His research streams include information assurance, extreme events, and improving performance on the Web. His papers have been published in a number of national and international journals. He is also the recipient of several grants from the university as well as external agencies. He serves as an associate editor for the Journal of Information Systems Security.
Abstracting & Indexing
Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.