Global Perspectives on Information Security Regulations: Compliance, Controls, and Assurance

Recent decades have seen a proliferation of cybersecurity guidance in the form of government regulations and standards with which organizations must comply. As society becomes more heavily dependent on cyberspace, increasing levels of security measures will need to be established and maintained to protect the confidentiality, integrity, and availability of information. Global Perspectives on Information Security Regulations: Compliance, Controls, and Assurance summarizes current cybersecurity guidance and provides a compendium of innovative and state-of-the-art compliance and assurance practices and tools. It provides a synopsis of current cybersecurity guidance that organizations should consider so that management and their auditors can regularly evaluate their extent of compliance. Covering topics such as cybersecurity laws, deepfakes, and information protection, this premier reference source is an excellent resource for cybersecurity consultants and professionals, IT specialists, business leaders and managers, government officials, faculty and administration of both K-12 and higher education, libraries, students and educators of higher education, researchers, and academicians.

Author
Publisher IGI Global
Release Date
ISBN 1799883922
Pages 309 pages
Rating 4/5 (20 users)

More Books:

Global Perspectives on Information Security Regulations: Compliance, Controls, and Assurance
Language: en
Pages: 309
Authors: Francia III, Guillermo A.
Categories: Computers
Type: BOOK - Published: 2022-05-27 - Publisher: IGI Global

Recent decades have seen a proliferation of cybersecurity guidance in the form of government regulations and standards with which organizations must comply. As
Optimizing Information Security and Advancing Privacy Assurance: New Technologies
Language: en
Pages: 338
Authors: Nemati, Hamid
Categories: Computers
Type: BOOK - Published: 2012-01-31 - Publisher: IGI Global

"This book reviews issues and trends in security and privacy at an individual user level, as well as within global enterprises, covering enforcement of existing
IT Auditing Using a System Perspective
Language: en
Pages: 260
Authors: Davis, Robert Elliot
Categories: Business & Economics
Type: BOOK - Published: 2020-06-26 - Publisher: IGI Global

As the power of computing continues to advance, companies have become increasingly dependent on technology to perform their operational requirements and to coll
Encyclopedia of Information Assurance - 4 Volume Set (Print)
Language: en
Pages: 3860
Authors: Rebecca Herold
Categories: Computers
Type: BOOK - Published: 2010-12-22 - Publisher: CRC Press

Charged with ensuring the confidentiality, integrity, availability, and delivery of all forms of an entity's information, Information Assurance (IA) professiona
IT Security Governance Innovations: Theory and Research
Language: en
Pages: 373
Authors: Mellado, Daniel
Categories: Computers
Type: BOOK - Published: 2012-09-30 - Publisher: IGI Global

Information technology in the workplace is vital to the management of workflow in the company; therefore, IT security is no longer considered a technical issue
Handbook of Research on Information Security and Assurance
Language: en
Pages: 586
Authors: Gupta, Jatinder N. D.
Categories: Computers
Type: BOOK - Published: 2008-08-31 - Publisher: IGI Global

"This book offers comprehensive explanations of topics in computer system security in order to combat the growing risk associated with technology"--Provided by
Computer Security Handbook, Set
Language: en
Pages: 2000
Authors: Seymour Bosworth
Categories: Business & Economics
Type: BOOK - Published: 2014-03-24 - Publisher: John Wiley & Sons

Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immed
Risk Management
Language: en
Pages: 598
Authors: Nerija Banaitiene
Categories: Business & Economics
Type: BOOK - Published: 2012-09-12 - Publisher: BoD – Books on Demand

Every business and decision involves a certain amount of risk. Risk might cause a loss to a company. This does not mean, however, that businesses cannot take ri
Addressing Identity, Access and Compliance Requirements using IBM Tivoli Identity and Access Assurance
Language: en
Pages: 62
Authors: Axel Buecker
Categories: Computers
Type: BOOK - Published: 2010-09-23 - Publisher: IBM Redbooks

Today, security is a concern for everyone, from members of the board to the data center. Each day another data breach occurs. These incidents can affect an orga
ECIW2010-Proceedings of the 9th European Conference on Information Warfare and Security
Language: en
Pages: 430
Authors: Josef Demergis
Categories: Computer security
Type: BOOK - Published: 2010-01-07 - Publisher: Academic Conferences Limited