This book creates a new possibility - it permits the performance of a scripted compliance audit process that was not possible before - and it permits that new process to be completed professionally, expeditiously, and relatively inexpensively
Corporate Directors’ & Officers’ Legal Duties for Information Security and Privacy: A Turn-Key Compliance Audit Process, by Charles Cresson Wood
WELL-KNOWN AUTHOR: Charles Cresson Wood is best known for his book entitled Information Security Policies Made Easy, which provides already-written policies, and which is now in its 12th edition (used by 70% of Fortune 500 Companies). Also relevant to the book described on this web site, is Charles’ book entitled Information Security Roles & Responsibilities Made Easy, which contains already-written job descriptions, mission statements, committee charters, and the like, and which is now in its second edition. Charles has published over 375 articles in the information security and privacy area.
IN-DEPTH RESEARCH: Charles has been speaking, researching, writing and consulting about roles and responsibilities in the information security and privacy field for a long time, and this paragraph provides a few samples of his work. In 1979, he was a member of the team, working at SRI International (formerly Stanford Research Institute), that produced the first manual for the investigation and prosecution of computer crime, which was published by the U.S. Department of Justice. In 1995, he published an article in Computers & Security entitled “Shifting Information Systems Security Responsibility from User Organizations to Vendor/Publisher Organizations.” In 2006, he published an article entitled “Compliance with the Industry-Specific Standard of Due Care,” in the Computer Security Alert. In 2016, he published an article in the Journal of Legislation entitled “Solving the Information Security & Privacy Crisis by Expanding the Scope of Top Management Personal Liability.” In 2017, he wrote (along with coauthors William S. Rogers, Jr. and Ralph Spencer Poore) an article in the ISSA Journal entitled “A Simple Appeal to Common Sense: Why the Current Legal & Regulatory Regime for Information Security & Privacy Doesn’t Work -- and Cannot Be Made to Work.” In 2018, he wrote (along with coauthors William S. Rogers, Jr., and Ralph Spencer Poore) an article in The SciTech Lawyer (published by the American Bar Association) entitled “Why It’s Now Time for an Internationally-Harmonized Legal Regime for Information Security and Privacy.”
EXTENSIVE EXPERIENCE: Charles Cresson Wood has been working in the information security and privacy field, as a technical consultant, a management consultant, and an independent attorney, for over 40 years. He has done information security and privacy work with over 125 organizations, many of them Fortune 500 companies. He has also done this same type of work for several federal government agencies and held a “top secret” clearance. Charles was a key member of a team that developed a new type of risk assessment for one of the branches of the US military, and he also worked as a management consultant specializing in information security and privacy at Stanford Research Institute (now SRI International).
OFFICIAL DESIGNATIONS: Charles holds a Doctor of Jurisprudence (JD) degree from St. Francis School of Law (magna cum laude). He is also currently a licensed California attorney. He has a Master of Business Administration (MBA) degree with a major in financial information systems, as well as a Bachelor of Science in Economics (BSE) degree with a major in accounting, both from the Wharton School of Business at the University of Pennsylvania. He additionally holds a Master of Science in Engineering (MSE) degree, with a major in computer science, from the Moore School of Engineering at the University of Pennsylvania (birthplace of the world’s first general-purpose electronic computer, which was called the ENIAC). While Charles has passed the California Certified Public Accountant (CPA) examination, he is neither certified as a CPA, nor does he hold himself out as a CPA. In contrast, Charles has been designated as Certified in the Governance of Enterprise Information Technology (CGEIT), a Certified Information Systems Auditor (CISA), a Certified Information Security Manager (CISM), a Certified Information Systems Security Professional (CISSP), and a Certified Information Privacy Professional (CIPP/US). He is also the recipient of the Lifetime Achievement Award from the Computer Security Institute for his “sincere dedication to the computer security profession.”
Related Third Party Reviews
Some reviews of Charles’ book entitled Information Security Policies Made Easy follow:
“A complete kit of proven best practices that any organization can use and customize to make policies that meet their exact needs. Don't write policies without it.” --Jay Heiser, Columnist, Information Security Magazine
“Charles Cresson Wood, CISSP, CISA, CISM, is a distinguished contributor to our field; in addition to extensive consulting in a wide range of industries, publication of hundreds of professional articles and five books, and service as a professional editor, he has also contributed expert commentary to the public news media.” --Michael Kabay, PhD, CISSP-ISSMP
Legal Services Available
Charles, and the attorneys on his team, are available to perform the Duties Audit™ compliance audit services described in the new book described on this web site. Charles furthermore prepares and delivers custom training and awareness materials tailored to the needs of a particular company’s Directors & Officers. He additionally assists firms in creating new, and upgrading existing, corporate governance systems, as well as new information technology governance systems, that integrate information security and privacy metrics.
Directors & Officers must, these days, be personally involved in information security and privacy. One article describing a survey done by The Conference Board indicated that cyber-security is the biggest external business worry of CEOs, and now ahead of competition and economic conditions. See Erik Sherman, U.S. CEOs More Worried About Cybersecurity than a Possible Recession, Fortune, January 17, 2019. Similarly, a 2014 survey indicated that cybersecurity is the number one issue keeping Directors & Officers awake at night. See John E. Black, Jr., Awake at Night: Cyber Breaches and the New Risk to Directors & Officers, IMRI.com, October 2014.]
Legal Services Disclaimer
Charles is licensed to provide legal services in California, and arrangements can most often be made to allow him—or other members of his legal team—to practice on a temporary basis in other states as well. Even when such arrangements cannot be made, it is possible for Charles, or another attorney member of his team, to provide services in another state, so long as a licensed attorney from that other state is involved on the project as a supervisor. The nature of the work and the specific state where the client is incorporated, and where the services would be rendered, would all need to be considered. Charles, or other attorneys on his team, would be pleased to perform some research on this point, and make this licensing determination, without any obligation or cost.
This web site provides general educational and awareness-raising information and is not intended to constitute, or be interpreted as, legal advice. The information on this web site is also not guaranteed to be up-to-date, and subsequent developments may render it outdated. The information on this web site is not intended to replace, and in fact cannot replace, the advice and counsel rendered by a licensed attorney who responds to the reader’s unique situation. Viewing this web site, responding via email, placing a phone call, or otherwise communicating with the Charles, or any of his staff, does not establish an attorney-client relationship. Such a relationship is established only by a negotiated legal services contract.
Neither the publisher, the author of this book, nor the Lawyer Auditor performing a Duties Audit, makes any pledge, promise, guarantee, or warrantee, and offers no insurance policy, and/or any other transfer of risk associated with legal and/or regulatory obligations facing the auditee firm (as well as its Directors & Officers) in the information security and privacy area, or for that matter, in any other area.