Managing Risk and Information Security : Protect to Enable.

Yazar:Harkins, Malcolm W
Materyal türü: KonuKonuYayıncı: Berkeley, CA : Apress L. P., 2016Telif hakkı tarihi: �2016Baskı: 2nd edTanım: 1 online resource (208 pages)İçerik türü:text Ortam türü:computer Taşıyıcı türü: online resourceISBN: 9781484214558Tür/Form:Electronic books.Ek fiziksel biçimler:Print version:: Managing Risk and Information SecurityLOC classification: QA76.9.A25Çevrimiçi kaynaklar: Click to View
İçindekiler:
Intro -- Contents at a Glance -- Contents -- Foreword -- Praise for the second edition of Managing Risk and Information Security -- About the Author -- Acknowledgments -- Preface -- Chapter 1: Introduction -- Protect to Enable� -- Building Trust -- Keeping the Company Legal: The Regulatory Flood -- Privacy: Protecting Personal Information -- Personalization vs. Privacy -- Financial Regulations -- E-Discovery -- Expanding Scope of Regulation -- The Rapid Proliferation of Information, Devices, and Things -- The Changing Threat Landscape -- Stealthy Malware -- Nine Irrefutable Laws of Information Risk -- A New Approach to Managing Risk -- Chapter 2: The Misperception of Risk -- The Subjectivity of Risk Perception -- How Employees Misperceive Risk -- The Lure of the Shiny Bauble -- How Security Professionals Misperceive Risk -- Security and Privacy -- How Decision Makers Misperceive Risk -- How to Mitigate the Misperception of Risk -- Uncovering New Perspectives During Risk Assessments -- Communication Is Essential -- Building Credibility -- Chapter 3: Governance and Internal Partnerships: How to Sense, Interpret, and Act on Risk -- Information Risk Governance -- Finding the Right Governance Structure -- Building Internal Partnerships -- Legal -- Privacy -- Litigation -- Intellectual Property -- Contracts -- Financial Compliance -- Legal Specialists Within Business Groups -- Human Resources -- Setting Employee Expectations in Security Policies -- Employee Communications -- Investigations -- Finance -- Sarbanes-Oxley Compliance -- Working with Business Groups -- Internal Audit -- Corporate Risk Management -- Privacy -- Corporate Security -- Business Group Managers -- Conclusion -- Chapter 4: External Partnerships: The Power of Sharing Information -- The Value of External Partnerships -- External Partnerships: Types and Tiers -- 1:1 Partnerships.
Communities -- Community Characteristics -- Community Goals -- Sharing Information about Threats and Vulnerabilities -- Sharing Best Practices and Benchmarking -- Influencing Regulations and Standards -- Corporate Citizenship -- Conclusion -- Chapter 5: People Are the Perimeter -- The Shifting Perimeter -- Compliance or Commitment? -- Examining the Risks -- Adjusting Behavior -- A Model for Improving Security Awareness -- Broadening the Awareness Model -- The Security Benefits of Personal Use -- Roundabouts and Stop Signs -- The Technology Professional -- Insider Threats -- Deter -- Detect -- Discipline -- Finding the Balance -- Chapter 6: Emerging Threats and Vulnerabilities: Reality and Rhetoric -- Structured Methods for Identifying Threat Trends -- The Product Life Cycle Model -- Understanding Threat Agents -- Playing War Games -- Trends That Span the Threat Landscape -- Trust Is an Attack Surface -- Barriers to Entry Are Crumbling -- The Rise of Edge Case Insecurity -- The Enemy Knows the System -- Key Threat Activity Areas -- The Industry of Malware -- The Web Expands to the Internet of Things -- Smartphones -- Web Applications -- Conclusion -- Chapter 7: A New Security Architecture to Improve Business Agility -- The 9 Box of Controls, Business Trends, and Architecture Requirements -- 9 Box of Controls -- IT Consumerization -- New Business Needs -- Cloud Computing -- Changing Threat Landscape -- Privacy and Regulatory Requirements -- New Architecture -- Trust Calculation -- Source Score -- Destination Score -- Available Controls -- Calculating Trust -- Security Zones -- Untrusted Zones -- Selective Zones -- Trusted Zones -- Balanced Controls -- Users, Data, and the Internet of Things: The New Perimeters -- Data Perimeter -- User Perimeter -- Internet of Things -- Conclusion -- Chapter 8: Looking to the Future: Emerging Security Capabilities.
Internet of Things -- Consistent User Experience Across Devices -- Cloud Computing -- Big Data Analytics -- Artificial Intelligence -- Business Benefits and Risks -- New Security Capabilities -- Baseline Security -- Protected Environments -- Encryption -- Hardware Acceleration -- Enhanced Recovery -- AI-Based Security and Automation -- Context-Aware Security -- Cloud Security and Context Awareness -- Security Analytics and Data Protection -- Conclusion -- Chapter 9: Corporate Social Responsibility: The Ethics of Managing Information Risk -- The Expanding Scope of Corporate Social Responsibility -- The Evolution of Technology and Its Impact -- Maintaining Society's Trust -- The Ethics of Managing Information Risk -- Conclusion -- Chapter 10: The 21st Century CISO -- Chief Trust Officer -- The Z-Shaped Individual -- Foundational Skills -- Becoming a Storyteller -- Fear Is Junk Food -- Accentuating the Positive -- Demonstrating the Reality of Risk -- The CISO's Sixth Sense -- Taking Action at the Speed of Trust -- The CISO as a Leader -- Learning from Other Business Leaders -- Voicing Our Values -- Discussing Information Risk at Board Level -- Conclusion -- Chapter 11: Performance Coaching -- How to Use the Tables -- Independence and Initiative -- Efficiency and Effectiveness -- Commitment -- Professionalism -- Discipline -- Teamwork -- Problem-Solving -- Communication -- Listening -- Style -- Clarity -- Goal-Setting -- Conclusion -- Appendix A -- Index.
Bu kütüphanenin etiketleri: Kütüphanedeki eser adı için etiket yok. Etiket eklemek için oturumu açın.
    Ortalama derecelendirme: 0.0 (0 oy)
Bu kayda ilişkin materyal yok

Intro -- Contents at a Glance -- Contents -- Foreword -- Praise for the second edition of Managing Risk and Information Security -- About the Author -- Acknowledgments -- Preface -- Chapter 1: Introduction -- Protect to Enable� -- Building Trust -- Keeping the Company Legal: The Regulatory Flood -- Privacy: Protecting Personal Information -- Personalization vs. Privacy -- Financial Regulations -- E-Discovery -- Expanding Scope of Regulation -- The Rapid Proliferation of Information, Devices, and Things -- The Changing Threat Landscape -- Stealthy Malware -- Nine Irrefutable Laws of Information Risk -- A New Approach to Managing Risk -- Chapter 2: The Misperception of Risk -- The Subjectivity of Risk Perception -- How Employees Misperceive Risk -- The Lure of the Shiny Bauble -- How Security Professionals Misperceive Risk -- Security and Privacy -- How Decision Makers Misperceive Risk -- How to Mitigate the Misperception of Risk -- Uncovering New Perspectives During Risk Assessments -- Communication Is Essential -- Building Credibility -- Chapter 3: Governance and Internal Partnerships: How to Sense, Interpret, and Act on Risk -- Information Risk Governance -- Finding the Right Governance Structure -- Building Internal Partnerships -- Legal -- Privacy -- Litigation -- Intellectual Property -- Contracts -- Financial Compliance -- Legal Specialists Within Business Groups -- Human Resources -- Setting Employee Expectations in Security Policies -- Employee Communications -- Investigations -- Finance -- Sarbanes-Oxley Compliance -- Working with Business Groups -- Internal Audit -- Corporate Risk Management -- Privacy -- Corporate Security -- Business Group Managers -- Conclusion -- Chapter 4: External Partnerships: The Power of Sharing Information -- The Value of External Partnerships -- External Partnerships: Types and Tiers -- 1:1 Partnerships.

Communities -- Community Characteristics -- Community Goals -- Sharing Information about Threats and Vulnerabilities -- Sharing Best Practices and Benchmarking -- Influencing Regulations and Standards -- Corporate Citizenship -- Conclusion -- Chapter 5: People Are the Perimeter -- The Shifting Perimeter -- Compliance or Commitment? -- Examining the Risks -- Adjusting Behavior -- A Model for Improving Security Awareness -- Broadening the Awareness Model -- The Security Benefits of Personal Use -- Roundabouts and Stop Signs -- The Technology Professional -- Insider Threats -- Deter -- Detect -- Discipline -- Finding the Balance -- Chapter 6: Emerging Threats and Vulnerabilities: Reality and Rhetoric -- Structured Methods for Identifying Threat Trends -- The Product Life Cycle Model -- Understanding Threat Agents -- Playing War Games -- Trends That Span the Threat Landscape -- Trust Is an Attack Surface -- Barriers to Entry Are Crumbling -- The Rise of Edge Case Insecurity -- The Enemy Knows the System -- Key Threat Activity Areas -- The Industry of Malware -- The Web Expands to the Internet of Things -- Smartphones -- Web Applications -- Conclusion -- Chapter 7: A New Security Architecture to Improve Business Agility -- The 9 Box of Controls, Business Trends, and Architecture Requirements -- 9 Box of Controls -- IT Consumerization -- New Business Needs -- Cloud Computing -- Changing Threat Landscape -- Privacy and Regulatory Requirements -- New Architecture -- Trust Calculation -- Source Score -- Destination Score -- Available Controls -- Calculating Trust -- Security Zones -- Untrusted Zones -- Selective Zones -- Trusted Zones -- Balanced Controls -- Users, Data, and the Internet of Things: The New Perimeters -- Data Perimeter -- User Perimeter -- Internet of Things -- Conclusion -- Chapter 8: Looking to the Future: Emerging Security Capabilities.

Internet of Things -- Consistent User Experience Across Devices -- Cloud Computing -- Big Data Analytics -- Artificial Intelligence -- Business Benefits and Risks -- New Security Capabilities -- Baseline Security -- Protected Environments -- Encryption -- Hardware Acceleration -- Enhanced Recovery -- AI-Based Security and Automation -- Context-Aware Security -- Cloud Security and Context Awareness -- Security Analytics and Data Protection -- Conclusion -- Chapter 9: Corporate Social Responsibility: The Ethics of Managing Information Risk -- The Expanding Scope of Corporate Social Responsibility -- The Evolution of Technology and Its Impact -- Maintaining Society's Trust -- The Ethics of Managing Information Risk -- Conclusion -- Chapter 10: The 21st Century CISO -- Chief Trust Officer -- The Z-Shaped Individual -- Foundational Skills -- Becoming a Storyteller -- Fear Is Junk Food -- Accentuating the Positive -- Demonstrating the Reality of Risk -- The CISO's Sixth Sense -- Taking Action at the Speed of Trust -- The CISO as a Leader -- Learning from Other Business Leaders -- Voicing Our Values -- Discussing Information Risk at Board Level -- Conclusion -- Chapter 11: Performance Coaching -- How to Use the Tables -- Independence and Initiative -- Efficiency and Effectiveness -- Commitment -- Professionalism -- Discipline -- Teamwork -- Problem-Solving -- Communication -- Listening -- Style -- Clarity -- Goal-Setting -- Conclusion -- Appendix A -- Index.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2022. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments on this title.

yorum yazmak için.

Ziyaretçi Sayısı

Destekleyen Koha