Complete Guide to Building an Information Security Program
Connecting Policies, Procedures, & IT Standards
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.
Add to basket failed.
Please try again later
Add to wishlist failed.
Please try again later
Remove from wishlist failed.
Please try again later
Adding to library failed
Please try again
Follow podcast failed
Unfollow podcast failed
£0.00 for first 30 days
LIMITED TIME OFFER
£0.99/mo for first 3 months
Offer ends January 21, 2025 11:59PM GMT. Terms and conditions apply.
Prime members: New to Audible? Get 2 free audiobooks during trial.
Pay £0.99/month. After 3 months pay £7.99/month. Renews automatically. See terms for eligibility.
Pick 1 audiobook a month from our unmatched collection - including bestsellers and new releases
Listen all you want to thousands of included audiobooks, Originals, celeb exclusives, and podcasts
Access exclusive sales and deals.
Pick 1 audiobook a month from our unmatched collection - including bestsellers and new releases.
Listen all you want to thousands of included audiobooks, Originals, celeb exclusives, and podcasts.
Access exclusive sales and deals.
£7.99/month after 30 days. Renews automatically. See here for eligibility.
Buy Now for £6.99
No valid payment method on file.
We are sorry. We are not allowed to sell this product with the selected payment method
Pay using card ending in
By completing your purchase, you agree to Audible's Conditions of Use and authorise Audible to charge your designated card or any other card on file. Please see our Privacy Notice, Cookies Notice and Interest-based Ads Notice.
-
Narrated by:
-
Lauren Garvin
About this listen
Every organization today faces an ever-changing set of threats in this digital landscape. Understanding how to develop a functional information security program to protect your organization’s reputation and brand from being tarnished due to a breach of your company’s sensitive information is more critical than ever. Developing a functional program that sets up the best information security practices across the organization’s operational workflows, is the leading practice for protecting against a possible breach.
©2019 David Rauschendorfer (P)2021 David Rauschendorfer
activate_Holiday_promo_in_buybox_DT_T2