Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions: Technologies and Applied Solutions

· IGI Global
Ebook
491
Pages
Eligible

About this ebook

Organizations, worldwide, have adopted practical and applied approaches for mitigating risks and managing information security program. Considering complexities of a large-scale, distributed IT environments, security should be proactively planned for and prepared ahead, rather than as used as reactions to changes in the landscape.

Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions presents high-quality research papers and practice articles on management and governance issues in the field of information security. The main focus of the book is to provide an organization with insights into practical and applied solutions, frameworks, technologies and practices on technological and organizational factors. The book aims to be a collection of knowledge for professionals, scholars, researchers and academicians working in this field that is fast evolving and growing as an area of information assurance.

About the author

Manish Gupta is an Information Security Professional in a Northeast based bank in US. He was an Adjunct Instructor/Professor (2007) at State University of New York at Buffalo, USA. He received his PhD in Management Science and Systems and an MBA in Information Systems and Finance from State University of New York, Buffalo, NY, USA in 2011 and 2003, respectively. He received his Bachelor’s degree in Mechanical Engineering from Institute of Engineering and Technology, Lucknow, India in 1998. He has more than twelve years of experience in information systems, security policies, and technologies. He has published 4 books in the area of information security, ethics, and assurance. He has published more than 50 research articles in leading journals, conference proceedings, and books including DSS, ACM Transactions, IEEE, and JOEUC. He serves in editorial boards of several international journals including Journal of Electronic Banking and International Journal of Liability and Scientific Enquiry (IJLSE), and has served in program committees of several international conferences. He holds several professional designations including CISSP, CISA, CISM, ISSPCS, CIW Security Analyst, and PMP. He is a member of Sigma Xi, Beta Gamma Sigma, ISACA, and ISC2. He received prestigious 2008 ISC2 information security scholarship (awarded on to only 7 researchers around the world) from ISC2 and also received PhD Student Achievement Award from SUNY Buffalo.

John Walp has more than 17 years of Information Technology experience, more than half of which has been focused on information security challenges. He currently serves as Administrative Vice President and Corporate Information Security Officer for M&T Bank, a $70 billion financial institution headquartered in Buffalo, NY. Previously, he held the role of Vice President, Network Security Solutions Manager for M&T. His responsibilities include forming and executing the overall strategy for Information Security and Privacy at M&T Bank. This includes groups which focus on external and internal network security, which are made up of key security systems such as firewalls, intrusion detection/prevention systems, and security information management platforms. In addition, his organization supports the functions of access management, and compliance and risk management. Mr. Walp was selected as the 2009 North East Information Security Executive of the Year, an honor given by the Executive Alliance. The ISE Northeast Awards recognize information security executives and their teams who demonstrate outstanding leadership in risk management, data asset protection, regulatory compliance, privacy, and network security across the region including the states of Connecticut, Maine, Massachusetts, New Hampshire, New Jersey, New York, Rhode Island, and Vermont. John is a Certified Information Systems Security Professional (CISSP) as well as a Certified Information Security Manager (CISM). He is a graduate of the FBI Citizens Academy and serves as Executive Vice President of the FBI’s Buffalo InfraGard Membership Alliance. Mr. Walp also serves on the advisory board of the Center of Excellence in Information Systems Assurance Research and Education (CEISARE) at the University of Buffalo. He is a member of the High-Tech Crime Consortium and the U.S. Secret Services Electronic Crimes Task Force. A Veteran of the United State Air Force, he served his country for 22 years which included both active and reserve service. In 2004, Mr. Walp was recalled to active duty and deployed to the Kingdom of Kuwait in support of Operation Iraqi Freedom and Operation Enduring Freedom. He was selected as part of an elite logistics cadre to aid in establishing the Central Command’s Deployment and Distribution Operations Center. He holds a Bachelor of Science in Computer Information Systems from State University of New York College at Buffalo. He and his wife Laurie have four children and make their home in Amherst, NY.

Raj Sharman is an associate professor in the Management Science and Systems Department at SUNY Buffalo, NY. He received his B. Tech and M. Tech degree from IIT Bombay (India) and his M.S degree in Industrial Engineering and PhD in Computer Science from Louisiana State University. His research streams include information assurance, extreme events, and improving performance on the Web. His papers have been published in a number of national and international journals. He is also the recipient of several grants from the university as well as external agencies. He serves as an associate editor for the Journal of Information Systems Security. [Editor]

Rate this ebook

Tell us what you think.

Reading information

Smartphones and tablets
Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.
Laptops and computers
You can listen to audiobooks purchased on Google Play using your computer's web browser.
eReaders and other devices
To read on e-ink devices like Kobo eReaders, you'll need to download a file and transfer it to your device. Follow the detailed Help Center instructions to transfer the files to supported eReaders.