About this book
Information Security and Risk Management best-practices enable professionals to plan, implement, measure, and test their organization’s systems and ensure they’re adequately protected against threats. The goal of the book is to give you guidance in the strategies and best practices that can be utilized for Information Security. The book is divided into three parts. The first part of the book will establish the core principles of information security and will talk about why Risk Management is important and how we can drive Information Security Governance.
The second part will explore methods in implementing security controls to achieve the organization’s information security goals. We will be covering design principles that can be utilized along with methods to assess and mitigate architectural vulnerabilities. The book will also talk about the best practices for designing secure network architectures and controlling and managing third-party identity services.
The third part of the book talks about designing and managing security testing processes along with ways in which we can improve the security of the software.
By the end of this book, you'll have learned how you can make your organization less vulnerable to threats, and reduce the likelihood and impact of exploitation. As a result, you will be able to make an impactful change in your organization towards a better level of information security.
- Publication date:
- April 2021