If you're an information security professional today, you are being forced to address growing cyber security threats and ever-evolving compliance requirements, while dealing with stagnant and decreasing budgets. The Frugal CISO: Using Innovation and Smart Approaches to Maximize Your Security Posture describes techniques you can immediately put to use to run an effective and efficient information-security management program in today's cost-cutting environment.
The book outlines a strategy for managing the information security function in a manner that optimizes cost efficiency and results. This strategy is designed to work across a wide variety of business sectors and economic conditions and focuses on producing long-term results through investment in people and technology.
The text illustrates real-world perspectives that reflect the day-to-day issues that you face in running an enterprise's security operations. Focused on managing information security programs for long-term operational success, in terms of efficiency, effectiveness, and budgeting ability, this book will help you develop the fiscal proficiency required to navigate the budgeting process.
After reading this book you will understand how to manage an information security program with a limited budget, while still maintaining an appropriate level of security controls and meeting compliance requirements. The concepts and methods identified in this book are applicable to a wide variation of teams, regardless of organizational size or budget.
At the same time that information security organizations face significant budgetary challenges, both cyber security threats and compliance requirements have escalated. This book describes actionable techniques for running an information-security management program during an era that has been known for cost-cutting to information security budgets. The concept is to allow practitioners to acquire skills at fiscal proficiency in managing information security issues, allowing them to deliver effective and efficient service while working within the restricted budgetary environment that exists at many information-security organizations.