| Table of Contents |
 | The Information Systems Security Officer's Guide—Establishing and Managing an Information Protection Program, Second Edition |
 | Preface |
 | Introduction |
| Section I - The Working Environment of an ISSO |
 | Chapter 1 | - | Understanding the Information World Environment |
 | Chapter 2 | - | Understanding the Business and Management Environment |
 | Chapter 3 | - | Understanding Today's Threats to Information Assets |
 | Chapter 4 | - | The International Widget Corporation (IWC) |
| Section II - The Duties and Responsibilities of an ISSO |
 | Chapter 5 | - | The ISSO's Position, Duties, and Responsibilities |
 | Chapter 6 | - | The Infosec Strategic, Tactical, and Annual Plans |
 | Chapter 7 | - | Establishing a CIAPP and Infosec Organization |
 | Chapter 8 | - | Determining and Establishing InfoSec Functions |
 | Chapter 9 | - | Establishing a Metrics Management System |
 | Chapter 10 | - | Annual Reevaluation and Future Plans |
 | Chapter 11 | - | High-Technology Crimes Investigative Support |
 | Chapter 12 | - | InfoSec in the Interest of National Security |
| Section III - The Global, Professional, and Personal Challenges of an ISSO |
 | Chapter 13 | - | The Related World of Information Warfare, Information Operations, and Information Assurance |
 | Chapter 14 | - | The ISSO and Ethical Conduct |
 | Chapter 15 | - | ISSO Career Development |
 | Chapter 16 | - | How to Market Yourself as an ISSO |
 | Chapter 17 | - | So, Are You Ready to Become an InfoSec Consultant? |
 | Chapter 18 | - | 21st-century Challenges for the ISSO |
 | Index |
 | List of Figures |
 | List of Case Studies |
 | List of Sidebars |