0%

Book Description

Deploy information security across the business

Knowing about information security is not enough. You also have to deploy it across the business - which means convincing management of its importance. Learn how with this essential guide!

Information technology plays a fundamental role in the operations of any modern business. While the confidentiality and integrity of your organisation's information have to be protected, a business still needs to have this information readily available in order to be able to function from day to day. If you are an information security practitioner, you need to be able to sell complex and often technical solutions to boards and management teams.

Sell information security to the board

Persuading the board to invest in information security measures requires sales skills. As an information security professional, you are a scientific and technical specialist; and yet you need to get your message across to people whose primary interests lie elsewhere, in turnover and overall performance. In other words, you need to develop sales and marketing skills.

This pocket guide will help you with the essential sales skills that persuade company directors to commit money and resources to your information security initiatives.

How this book can help information security professionals:

  • Understand basic sales techniques Find out what to do to capture the attention of management and win them over
  • Understand how to present yourself Present yourself so that management takes you seriously, and ensure your proposal receives a proper hearing.
  • Find out how to earn management's trust This guide shows you how to persuade management that you are the kind of information security professional who is interested in supporting, rather than impeding, business success.
  • Learn how to craft a successful proposal This guide offers you invaluable tips on how to write a proposal that will communicate your ideas effectively to senior executives.
"

Table of Contents

  1. Cover
  2. Title page
  3. Copyright
  4. Contents
  5. Introduction
  6. Chapter 1: Carelessness
  7. Chapter 2: Accidental Disclosure
  8. Chapter 3: People are Intelligent
  9. Chapter 4: An Aside: Password Policies
  10. Chapter 5: People are Helpful and Trusting
  11. Chapter 6: Harnessing Human Qualities to Improve Security
  12. Chapter 7: Why Raise Awareness?
    1. BT case study
  13. Chapter 8: Beyond Awareness
  14. Chapter 9: The Extended Enterprise
  15. Chapter 10: Process Design
  16. Chapter 11: Usability
  17. Chapter 12: And Finally
  18. ITG Resources
3.138.116.20