- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
A practitioner's handbook that integrates knowledge, competencies, methodologies and applications across the discipline. Can improve the effectiveness of organizational and individual Risk Management practices by documenting and integrating best-practice concepts from a range of complementary disciplines.
Andere Kunden interessierten sich auch für
- Christopher J HodsonCyber Risk Management44,99 €
- Elena PykhovaOperational Risk Management in Financial Services58,99 €
- Jacqueline JeynesRisk Management44,99 €
- Hakan JankensgardEmpowered Enterprise Risk Management38,99 €
- Stephen J. MildenhallPricing Insurance Risk98,99 €
- Michel CrouhyThe Essentials of Risk Management, Third Edition46,99 €
- Philippa X. GirlingOperational Risk Management88,99 €
-
-
A practitioner's handbook that integrates knowledge, competencies, methodologies and applications across the discipline. Can improve the effectiveness of organizational and individual Risk Management practices by documenting and integrating best-practice concepts from a range of complementary disciplines.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Wiley Series in Systems Engineering and Management
- Verlag: John Wiley & Sons Inc
- Seitenzahl: 480
- Erscheinungstermin: 1. August 2009
- Englisch
- Abmessung: 260mm x 183mm x 30mm
- Gewicht: 1146g
- ISBN-13: 9780470454626
- ISBN-10: 0470454628
- Artikelnr.: 26431847
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
- Wiley Series in Systems Engineering and Management
- Verlag: John Wiley & Sons Inc
- Seitenzahl: 480
- Erscheinungstermin: 1. August 2009
- Englisch
- Abmessung: 260mm x 183mm x 30mm
- Gewicht: 1146g
- ISBN-13: 9780470454626
- ISBN-10: 0470454628
- Artikelnr.: 26431847
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Julian Talbot is the Practice Leader for Risk Management with JBS, a specialist business strategy and risk management company. Previously he held roles as manager of security for the Australian governments most extensive over-seas network (Austrade) and for Australias largest natural resources project, Woodsides $20 billion North West Shelf Venture. He has also held roles as a director with the Risk Management Institution of Australasia (RMIA), director of the Australian Institute of Professional Intelligence Officers, and a research associate with the Australian Homeland Security Research Centre. Miles Jakeman, PhD, is the Managing Director of Citadel Group Limited. His key skills cover business strategy, program management, and security risk management. Dr. Jakeman has worked with defense, intelligence, and national security agencies, as well as multinational companies. He is a member of the Australian Institute of Company Directors and the ACT Capital Angels, a preferred risk management supplier to the Australasian Business Travelers Association and an Associate of RMIA.
PREFACE xiii
ACKNOWLEDGMENTS xv
ABOUT SRMBOK xvii
1 INTRODUCTION AND OVERVIEW 1
1.1 Why SRMBOK? 1
1.2 Where Do We Go from Here? 3
1.3 What is Security Risk Management? 4
1.4 How does SRM Relate to Risk Management? 11
1.5 Conclusion, 14
2 SECURITY RISK MANAGEMENT CONTEXT 15
2.1 The Changing Security Environment, 15
2.2 Changing Concepts in Security Risk Management, 16
2.3 Origins of Security and Risk Management, 18
2.4 Trends and Future Directions, 18
2.5 Globalization, Opportunity, and Volatility, 19
2.6 Transnational and Extrajurisdictional Risks, 20
2.7 Law, Regulatory Framework, and Ramifications for Management, 21
2.8 Diversification or Concentration? 22
2.9 Political Awareness, 23
2.10 Risk versus Reward, 24
2.11 Summary of Key Points, 24
3 SECURITY GOVERNANCE 27
3.1 Introduction, 27
3.2 What Is Security Governance? 28
3.3 Duty of Care, 28
3.4 Resilience, 30
3.5 Security Culture, 37
3.6 Governance Frameworks, 38
3.7 Incident Management and Reporting, 41
3.8 Summary of Key Points, 42
4 SRMBOK FRAMEWORK 43
4.1 SRMBOK Guiding Principles, 46
5 PRACTICE AREAS 53
5.1 Introduction, 53
5.2 Security Management, 56
5.3 Physical Security, 59
5.4 People Security, 63
5.5 ICT Security, 77
5.6 Information Security, 81
6 STRATEGIC KNOWLEDGE AREAS 97
6.1 Introduction, 97
6.2 Exposure, 105
6.3 Risk, 130
6.4 Resources, 166
6.5 Quality, 172
7 OPERATIONAL COMPETENCY AREAS 195
7.1 Business Integration, 195
7.2 Functional Design, 202
7.3 Implementation Management, 204
7.4 Assurance and Audit, 211
8 ACTIVITY AREAS 219
8.1 Introduction, 219
8.2 Intelligence, 224
8.3 Protective Security, 230
8.4 Response, 231
8.5 Recovery and Continuity, 242
8.6 Summary of Key Points, 253
9 SECURITY RISK MANAGEMENT ENABLERS 255
9.1 Introduction, 255
9.2 Summary of Key Points, 259
10 ASSET AREAS 261
10.1 What Is an Asset? 261
10.2 Key Asset Groups, 264
11 SRM INTEGRATION 269
11.1 SRM Integration with Enterprise Risk Management, 273
11.2 ERM Frameworks, 274
11.3 Implementing an Integrated ERM Program, 276
11.4 Summary of Key Points, 282
12 SRM LEXICON 285
12.1 Introduction, 285
12.2 Illustrations, 286
12.3 Notes to Readers, 289
12.4 Definitions, 290
13 SAMPLE TEMPLATES 339
13.1 Security Risk Register form (Example 1), 340
13.2 Security Risk Register form (Example 2), 340
13.3 Risk Treatment Schedule (Example 1), 341
13.4 Risk Treatment Schedule (Example 2), 341
13.5 Outline Security Plan, 342
13.6 Day-to-Day Operational Governance Registers, 343
13.7 Property Selection and Security Planning Checklist, 349
13.8 Sample Commitment Statement to Security and Risk Management, 361
13.9 Sample Bomb Threat Checklist, 362
13.10 Sample Bomb Threat Room Search Checklist, 364
13.11 Evaluation Criteria for Business Continuity and Organizational
Resilience, 365
14 ABOUT THE LEAD AUTHORS 417
14.1 Julian Talbot, CPP, 417
14.2 Dr Miles Jakeman, 418
BIBLIOGRAPHY AND OTHER REFERENCES 419
INDEX 427
ACKNOWLEDGMENTS xv
ABOUT SRMBOK xvii
1 INTRODUCTION AND OVERVIEW 1
1.1 Why SRMBOK? 1
1.2 Where Do We Go from Here? 3
1.3 What is Security Risk Management? 4
1.4 How does SRM Relate to Risk Management? 11
1.5 Conclusion, 14
2 SECURITY RISK MANAGEMENT CONTEXT 15
2.1 The Changing Security Environment, 15
2.2 Changing Concepts in Security Risk Management, 16
2.3 Origins of Security and Risk Management, 18
2.4 Trends and Future Directions, 18
2.5 Globalization, Opportunity, and Volatility, 19
2.6 Transnational and Extrajurisdictional Risks, 20
2.7 Law, Regulatory Framework, and Ramifications for Management, 21
2.8 Diversification or Concentration? 22
2.9 Political Awareness, 23
2.10 Risk versus Reward, 24
2.11 Summary of Key Points, 24
3 SECURITY GOVERNANCE 27
3.1 Introduction, 27
3.2 What Is Security Governance? 28
3.3 Duty of Care, 28
3.4 Resilience, 30
3.5 Security Culture, 37
3.6 Governance Frameworks, 38
3.7 Incident Management and Reporting, 41
3.8 Summary of Key Points, 42
4 SRMBOK FRAMEWORK 43
4.1 SRMBOK Guiding Principles, 46
5 PRACTICE AREAS 53
5.1 Introduction, 53
5.2 Security Management, 56
5.3 Physical Security, 59
5.4 People Security, 63
5.5 ICT Security, 77
5.6 Information Security, 81
6 STRATEGIC KNOWLEDGE AREAS 97
6.1 Introduction, 97
6.2 Exposure, 105
6.3 Risk, 130
6.4 Resources, 166
6.5 Quality, 172
7 OPERATIONAL COMPETENCY AREAS 195
7.1 Business Integration, 195
7.2 Functional Design, 202
7.3 Implementation Management, 204
7.4 Assurance and Audit, 211
8 ACTIVITY AREAS 219
8.1 Introduction, 219
8.2 Intelligence, 224
8.3 Protective Security, 230
8.4 Response, 231
8.5 Recovery and Continuity, 242
8.6 Summary of Key Points, 253
9 SECURITY RISK MANAGEMENT ENABLERS 255
9.1 Introduction, 255
9.2 Summary of Key Points, 259
10 ASSET AREAS 261
10.1 What Is an Asset? 261
10.2 Key Asset Groups, 264
11 SRM INTEGRATION 269
11.1 SRM Integration with Enterprise Risk Management, 273
11.2 ERM Frameworks, 274
11.3 Implementing an Integrated ERM Program, 276
11.4 Summary of Key Points, 282
12 SRM LEXICON 285
12.1 Introduction, 285
12.2 Illustrations, 286
12.3 Notes to Readers, 289
12.4 Definitions, 290
13 SAMPLE TEMPLATES 339
13.1 Security Risk Register form (Example 1), 340
13.2 Security Risk Register form (Example 2), 340
13.3 Risk Treatment Schedule (Example 1), 341
13.4 Risk Treatment Schedule (Example 2), 341
13.5 Outline Security Plan, 342
13.6 Day-to-Day Operational Governance Registers, 343
13.7 Property Selection and Security Planning Checklist, 349
13.8 Sample Commitment Statement to Security and Risk Management, 361
13.9 Sample Bomb Threat Checklist, 362
13.10 Sample Bomb Threat Room Search Checklist, 364
13.11 Evaluation Criteria for Business Continuity and Organizational
Resilience, 365
14 ABOUT THE LEAD AUTHORS 417
14.1 Julian Talbot, CPP, 417
14.2 Dr Miles Jakeman, 418
BIBLIOGRAPHY AND OTHER REFERENCES 419
INDEX 427
PREFACE xiii
ACKNOWLEDGMENTS xv
ABOUT SRMBOK xvii
1 INTRODUCTION AND OVERVIEW 1
1.1 Why SRMBOK? 1
1.2 Where Do We Go from Here? 3
1.3 What is Security Risk Management? 4
1.4 How does SRM Relate to Risk Management? 11
1.5 Conclusion, 14
2 SECURITY RISK MANAGEMENT CONTEXT 15
2.1 The Changing Security Environment, 15
2.2 Changing Concepts in Security Risk Management, 16
2.3 Origins of Security and Risk Management, 18
2.4 Trends and Future Directions, 18
2.5 Globalization, Opportunity, and Volatility, 19
2.6 Transnational and Extrajurisdictional Risks, 20
2.7 Law, Regulatory Framework, and Ramifications for Management, 21
2.8 Diversification or Concentration? 22
2.9 Political Awareness, 23
2.10 Risk versus Reward, 24
2.11 Summary of Key Points, 24
3 SECURITY GOVERNANCE 27
3.1 Introduction, 27
3.2 What Is Security Governance? 28
3.3 Duty of Care, 28
3.4 Resilience, 30
3.5 Security Culture, 37
3.6 Governance Frameworks, 38
3.7 Incident Management and Reporting, 41
3.8 Summary of Key Points, 42
4 SRMBOK FRAMEWORK 43
4.1 SRMBOK Guiding Principles, 46
5 PRACTICE AREAS 53
5.1 Introduction, 53
5.2 Security Management, 56
5.3 Physical Security, 59
5.4 People Security, 63
5.5 ICT Security, 77
5.6 Information Security, 81
6 STRATEGIC KNOWLEDGE AREAS 97
6.1 Introduction, 97
6.2 Exposure, 105
6.3 Risk, 130
6.4 Resources, 166
6.5 Quality, 172
7 OPERATIONAL COMPETENCY AREAS 195
7.1 Business Integration, 195
7.2 Functional Design, 202
7.3 Implementation Management, 204
7.4 Assurance and Audit, 211
8 ACTIVITY AREAS 219
8.1 Introduction, 219
8.2 Intelligence, 224
8.3 Protective Security, 230
8.4 Response, 231
8.5 Recovery and Continuity, 242
8.6 Summary of Key Points, 253
9 SECURITY RISK MANAGEMENT ENABLERS 255
9.1 Introduction, 255
9.2 Summary of Key Points, 259
10 ASSET AREAS 261
10.1 What Is an Asset? 261
10.2 Key Asset Groups, 264
11 SRM INTEGRATION 269
11.1 SRM Integration with Enterprise Risk Management, 273
11.2 ERM Frameworks, 274
11.3 Implementing an Integrated ERM Program, 276
11.4 Summary of Key Points, 282
12 SRM LEXICON 285
12.1 Introduction, 285
12.2 Illustrations, 286
12.3 Notes to Readers, 289
12.4 Definitions, 290
13 SAMPLE TEMPLATES 339
13.1 Security Risk Register form (Example 1), 340
13.2 Security Risk Register form (Example 2), 340
13.3 Risk Treatment Schedule (Example 1), 341
13.4 Risk Treatment Schedule (Example 2), 341
13.5 Outline Security Plan, 342
13.6 Day-to-Day Operational Governance Registers, 343
13.7 Property Selection and Security Planning Checklist, 349
13.8 Sample Commitment Statement to Security and Risk Management, 361
13.9 Sample Bomb Threat Checklist, 362
13.10 Sample Bomb Threat Room Search Checklist, 364
13.11 Evaluation Criteria for Business Continuity and Organizational
Resilience, 365
14 ABOUT THE LEAD AUTHORS 417
14.1 Julian Talbot, CPP, 417
14.2 Dr Miles Jakeman, 418
BIBLIOGRAPHY AND OTHER REFERENCES 419
INDEX 427
ACKNOWLEDGMENTS xv
ABOUT SRMBOK xvii
1 INTRODUCTION AND OVERVIEW 1
1.1 Why SRMBOK? 1
1.2 Where Do We Go from Here? 3
1.3 What is Security Risk Management? 4
1.4 How does SRM Relate to Risk Management? 11
1.5 Conclusion, 14
2 SECURITY RISK MANAGEMENT CONTEXT 15
2.1 The Changing Security Environment, 15
2.2 Changing Concepts in Security Risk Management, 16
2.3 Origins of Security and Risk Management, 18
2.4 Trends and Future Directions, 18
2.5 Globalization, Opportunity, and Volatility, 19
2.6 Transnational and Extrajurisdictional Risks, 20
2.7 Law, Regulatory Framework, and Ramifications for Management, 21
2.8 Diversification or Concentration? 22
2.9 Political Awareness, 23
2.10 Risk versus Reward, 24
2.11 Summary of Key Points, 24
3 SECURITY GOVERNANCE 27
3.1 Introduction, 27
3.2 What Is Security Governance? 28
3.3 Duty of Care, 28
3.4 Resilience, 30
3.5 Security Culture, 37
3.6 Governance Frameworks, 38
3.7 Incident Management and Reporting, 41
3.8 Summary of Key Points, 42
4 SRMBOK FRAMEWORK 43
4.1 SRMBOK Guiding Principles, 46
5 PRACTICE AREAS 53
5.1 Introduction, 53
5.2 Security Management, 56
5.3 Physical Security, 59
5.4 People Security, 63
5.5 ICT Security, 77
5.6 Information Security, 81
6 STRATEGIC KNOWLEDGE AREAS 97
6.1 Introduction, 97
6.2 Exposure, 105
6.3 Risk, 130
6.4 Resources, 166
6.5 Quality, 172
7 OPERATIONAL COMPETENCY AREAS 195
7.1 Business Integration, 195
7.2 Functional Design, 202
7.3 Implementation Management, 204
7.4 Assurance and Audit, 211
8 ACTIVITY AREAS 219
8.1 Introduction, 219
8.2 Intelligence, 224
8.3 Protective Security, 230
8.4 Response, 231
8.5 Recovery and Continuity, 242
8.6 Summary of Key Points, 253
9 SECURITY RISK MANAGEMENT ENABLERS 255
9.1 Introduction, 255
9.2 Summary of Key Points, 259
10 ASSET AREAS 261
10.1 What Is an Asset? 261
10.2 Key Asset Groups, 264
11 SRM INTEGRATION 269
11.1 SRM Integration with Enterprise Risk Management, 273
11.2 ERM Frameworks, 274
11.3 Implementing an Integrated ERM Program, 276
11.4 Summary of Key Points, 282
12 SRM LEXICON 285
12.1 Introduction, 285
12.2 Illustrations, 286
12.3 Notes to Readers, 289
12.4 Definitions, 290
13 SAMPLE TEMPLATES 339
13.1 Security Risk Register form (Example 1), 340
13.2 Security Risk Register form (Example 2), 340
13.3 Risk Treatment Schedule (Example 1), 341
13.4 Risk Treatment Schedule (Example 2), 341
13.5 Outline Security Plan, 342
13.6 Day-to-Day Operational Governance Registers, 343
13.7 Property Selection and Security Planning Checklist, 349
13.8 Sample Commitment Statement to Security and Risk Management, 361
13.9 Sample Bomb Threat Checklist, 362
13.10 Sample Bomb Threat Room Search Checklist, 364
13.11 Evaluation Criteria for Business Continuity and Organizational
Resilience, 365
14 ABOUT THE LEAD AUTHORS 417
14.1 Julian Talbot, CPP, 417
14.2 Dr Miles Jakeman, 418
BIBLIOGRAPHY AND OTHER REFERENCES 419
INDEX 427