
Complete Guide to Building an Information Security Program
Connecting Policies, Procedures, & IT Standards
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.
Add to basket failed.
Please try again later
Add to wishlist failed.
Please try again later
Remove from wishlist failed.
Please try again later
Adding to library failed
Please try again
Follow podcast failed
Unfollow podcast failed
LIMITED TIME OFFER
3 months free
£8.99/mo thereafter. Renews automatically. Terms apply. Offer ends 31 July 2025 at 23:59 GMT.
Pick 1 audiobook a month from our unmatched collection.
Listen all you want to thousands of included audiobooks, Originals, and podcasts.
Access exclusive sales and deals.
Premium Plus auto-renews for £8.99/mo after 3 months. Cancel monthly.
Buy Now for £6.99
No valid payment method on file.
We are sorry. We are not allowed to sell this product with the selected payment method
Pay using card ending in
By completing your purchase, you agree to Audible's Conditions of Use and authorise Audible to charge your designated card or any other card on file. Please see our Privacy Notice, Cookies Notice and Interest-based Ads Notice.
-
Narrated by:
-
Lauren Garvin
About this listen
Every organization today faces an ever-changing set of threats in this digital landscape. Understanding how to develop a functional information security program to protect your organization’s reputation and brand from being tarnished due to a breach of your company’s sensitive information is more critical than ever. Developing a functional program that sets up the best information security practices across the organization’s operational workflows, is the leading practice for protecting against a possible breach.
©2019 David Rauschendorfer (P)2021 David Rauschendorfer
No reviews yet