Ensuring Information Assets Protection


eBook
Pages: 156
Language: English
Publication date: 30/11/-0001
25.40 €
VAT included
Instant download after purchase
Adobe PDF format Adobe PDF format
Presentation of key factors for ensuring information assets protection
Information technology (IT) assets must be protected from external and internal activities detrimental to effective and efficient functionality. For this purpose, mechanisms exist that can be utilized to ensure hardware, software, and other resources are operated on by only those tasks that have gained proper authorization. “Ensuring Information Assets Protection” presents a proven approach to deploying entity-centric IT security frameworks, architectures, methods, and techniques. In terms of content, this publication converts selected standards and guidelines into practical applications using detailed examples and conceptual graphics. Through this publication, security professionals will acquire an appreciation for the complexities associated with ensuring an adequate information security program.
El vendedor asume toda la responsabilidad de esta entrada.
Robert E. Davis obtained a Bachelor of Business Administration degree in Accounting and Business Law and a Master of Business Administration degree in Management Information Systems from Temple and West Chester University; respectively. In addition, during his twenty years of involvement in education, Robert acquired Postgraduate and Professional Technical licenses in Computer Science and Computer Systems Technology. Robert also obtained the Certified Information Systems Auditor (CISA) certificate -- after passing the 1988 Information Systems Audit and Control Association’s rigorous three hundred and fifty multiple-choice questions examination; and was conferred the Certified Internal Controls Auditor (CICA) certificate by the Institute for Internal Controls.

Since starting his career as an information systems (IS) auditor, Robert has provided data security consulting and IS auditing services to the United States Securities and Exchange Commission, United States Enrichment Corporation, Raytheon Company, United States Interstate Commerce Commission, Dow Jones & Company and Fidelity/First Fidelity (Wells Fargo) corporations as well as other organizations; in staff through management positions.

Prior to engaging in the practice of IS auditing and information security consulting; Robert (as a corporate employee) provided inventory as well as general accounting services to Philip Morris, USA and general accounting services to Philadelphia National Bank (Wells Fargo). Furthermore, he has prior experience as a freelance writer of IT audit and information security training material. Specifically, his published credits include:

•Assuring IT Governance

•Assuring IT Legal Compliance

•Ensuring Information Assets Protection

•IT Auditing: An Adaptive System

•IT Auditing: Assuring Information Assets Protection

•IT Auditing: Business Continuity and Disaster Recovery

•IT Auditing: Information Assets Protection

•IT Auditing: Information Security Governance

•IT Auditing: Irregular and Illegal Acts

•IT Auditing: IT Governance

•IT Auditing: IT Service Delivery and Support

•IT Auditing: Systems and Infrastructure Life Cycle Management

•IT Auditing: The Process

Robert has authored articles addressing IT issues for The Institute of Internal Auditors, IT Governance LTD and ISACA as well as peer reviewed Carnegie Mellon University's technical report "Comparing eSCM-SP v2 and COBIT" and five chapters of Bloomsbury's "Effective Auditing for Corporates".

In regards to training individuals in the information systems audit process, he has provided instruction to the Data Processing Management Association, ISACA-Philadelphia Chapter CISA Review Course participants, 3rd Annual Securasia Congress delegates and an Internet CISA study group.

Based on his accomplishments, Robert has been featured in Temple University's Fox School of Business and Management Alumni Newsletter as well as The Institute for Internal Controls e-newsletter. Furthermore, he is listed as: a Temple University Master of Science in IT Auditing and Cyber-Security Advisory Council member, an IT Governance LTD expert panel member, a leading expert and specialist by The Compliance Authority as well as an International Association of IT Governance Standards honorary member.

If you like this ebook, you might also like:

© 2019 XinXii - GD Publishing Ltd. & Co. KG. Imprint | Terms of Use | Privacy Policy
€ Euro
International sites: German (main) | English | Spanish | French | Italian | Dutch | Portuguese | Russian