gogogo
Syndetics cover image
Image from Syndetics

Security risk management [electronic book] : building an information security risk management program from the ground up / Evan Wheeler.

By: Contributor(s): Material type: TextTextPublication details: Waltham, MA : Syngress, c2011.Description: xxi, 340 pISBN:
  • 1597496154 (electronic bk.)
  • 9781597496155 (electronic bk.)
Subject(s): Genre/Form: Online resources:
Contents:
Introduction to Risk Management -- Risk Assessment and Analysis Techniques -- Building and Running a Risk Management Program.
Summary: The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix something, but they can't explain why. This book will help you to break free from the so-called "best practices" argument by articulating risk exposures in business terms. You will learn techniques for how to perform risk assessments for new IT projects, how to efficiently manage daily risk activities, and how to qualify the current risk level for presentation to executive level management. While other books focus entirely on risk analysis methods, this is the first comprehensive guide for managing security risks. Includes case studies to provide hands-on experience using risk assessment tools to calculate the costs and benefits of any security investment. Explores each phase of the risk management lifecycle, focusing on policies and assessment processes that should be used to properly assess and mitigate risk. Presents a roadmap for designing and implementing a security risk management program.
No physical items for this record

Enhanced descriptions from Syndetics:

Security Risk Management is the definitive guide for building or running an information security risk management program. This book teaches practical techniques that will be used on a daily basis, while also explaining the fundamentals so students understand the rationale behind these practices. It explains how to perform risk assessments for new IT projects, how to efficiently manage daily risk activities, and how to qualify the current risk level for presentation to executive level management. While other books focus entirely on risk analysis methods, this is the first comprehensive text for managing security risks.

This book will help you to break free from the so-called best practices argument by articulating risk exposures in business terms. It includes case studies to provide hands-on experience using risk assessment tools to calculate the costs and benefits of any security investment. It explores each phase of the risk management lifecycle, focusing on policies and assessment processes that should be used to properly assess and mitigate risk. It also presents a roadmap for designing and implementing a security risk management program.

This book will be a valuable resource for CISOs, security managers, IT managers, security consultants, IT auditors, security analysts, and students enrolled in information security/assurance college programs.

Includes bibliographical references and index.

Introduction to Risk Management -- Risk Assessment and Analysis Techniques -- Building and Running a Risk Management Program.

The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix something, but they can't explain why. This book will help you to break free from the so-called "best practices" argument by articulating risk exposures in business terms. You will learn techniques for how to perform risk assessments for new IT projects, how to efficiently manage daily risk activities, and how to qualify the current risk level for presentation to executive level management. While other books focus entirely on risk analysis methods, this is the first comprehensive guide for managing security risks. Includes case studies to provide hands-on experience using risk assessment tools to calculate the costs and benefits of any security investment. Explores each phase of the risk management lifecycle, focusing on policies and assessment processes that should be used to properly assess and mitigate risk. Presents a roadmap for designing and implementing a security risk management program.

Electronic reproduction. Amsterdam : Elsevier Science & Technology, 2011. Mode of access: World Wide Web. System requirements: Web browser. Title from title screen (viewed on May 10, 2011). Access may be restricted to users at subscribing institutions.

Table of contents provided by Syndetics

  • Part I Introduction to Risk Management
  • Chapter 1 The Security Evolution
  • Chapter 2 Risky Business
  • Chapter 3 The Risk Management Lifecycle
  • Chapter 4 Risk Profiling
  • Part II Risk Assessment and Analysis Techniques
  • Chapter 5 Formulating a Risk
  • Chapter 6 Risk Exposure Factors
  • Chapter 7 Security Controls and Services
  • Chapter 8 Risk Evaluation and Mitigation Strategies
  • Chapter 9 Reports and Consulting
  • Chapter 10 Risk Assessment Techniques
  • Part III Building and Running a Risk Management Program
  • Chapter 11 Threat and Vulnerability Management
  • Chapter 12 Security Risk Reviews
  • Chapter 13 A Blueprint for Security
  • Chapter 14 Building a Program from Scratch
  • Appendix A Security Risk Profile
  • Appendix B Risk Models and Scales
  • Appendix C Architectural Risk Analysis
  • Reference
  • Tables

Author notes provided by Syndetics

Evan Wheeler currently is a Director of Information Security for Omgeo (A DTCC | Thomson Reuters Company), an instructor at both Clark and Northeastern Universities, and the author of the Information Security Risk Management course for the SANS Institute. Previously he spent six years as a Security Consultant for the U.S. Department of Defense.

Powered by Koha