Narrow your search
Listing 1 - 4 of 4
Sort by

Book
Security risk management : building an information security risk management program from the ground up
Author:
ISBN: 1283526395 9786613838841 1597496162 1597496154 9781597496155 9781597496162 Year: 2011 Publisher: Waltham, MA : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix something, but they can't explain why. This book will help you to break free from the so-called ""best practices"" argument by articulating risk exposures in business terms. You will learn techniques for how to perform risk assessments for new IT projects, how to efficiently manage daily ri


Book
Security risk management
Author:
ISBN: 9781597496155 1597496154 9781597496162 1597496162 Year: 2011 Publisher: Waltham, MA Syngress

Loading...
Export citation

Choose an application

Bookmark

Abstract

The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix something, but they can't explain why. This book will help you to break free from the so-called "best practices" argument by articulating risk exposures in business terms. You will learn techniques for how to perform risk assessments for new IT projects, how to efficiently manage daily risk activities, and how to qualify the current risk level for presentation to executive level management. While other books focus entirely on risk analysis methods, this is the first comprehensive guide for managing security risks. Includes case studies to provide hands-on experience using risk assessment tools to calculate the costs and benefits of any security investment. Explores each phase of the risk management lifecycle, focusing on policies and assessment processes that should be used to properly assess and mitigate risk. Presents a roadmap for designing and implementing a security risk management program.


Digital
Security risk management : building an information security risk management program from the ground up
Author:
ISBN: 9781597496155 1597496154 9781597496162 1597496162 Year: 2011 Publisher: Waltham, MA Syngress

Loading...
Export citation

Choose an application

Bookmark

Abstract

The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix something, but they can't explain why. This book will help you to break free from the so-called "best practices" argument by articulating risk exposures in business terms. You will learn techniques for how to perform risk assessments for new IT projects, how to efficiently manage daily risk activities, and how to qualify the current risk level for presentation to executive level management. While other books focus entirely on risk analysis methods, this is the first comprehensive guide for managing security risks. Includes case studies to provide hands-on experience using risk assessment tools to calculate the costs and benefits of any security investment. Explores each phase of the risk management lifecycle, focusing on policies and assessment processes that should be used to properly assess and mitigate risk. Presents a roadmap for designing and implementing a security risk management program.

Keywords

Business policy


Book
Information security risk assessment toolkit : practical assessments through data collection and data analysis
Authors: --- ---
ISBN: 1283705508 1597499757 1597497355 9781597497350 Year: 2013 Publisher: Amsterdam ; Boston : Elsevier,

Loading...
Export citation

Choose an application

Bookmark

Abstract

In order to protect company's information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments. Effective risk assessments are meant to provide a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. Information Security Ris

Listing 1 - 4 of 4
Sort by