Jim Seaman, Michael Gioia
Security Risk Management - The Driving Force for Operational Resilience
The Firefighting Paradox
57,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in über 4 Wochen
Melden Sie sich
hier
hier
für den Produktalarm an, um über die Verfügbarkeit des Produkts informiert zu werden.
Jim Seaman, Michael Gioia
Security Risk Management - The Driving Force for Operational Resilience
The Firefighting Paradox
- Broschiertes Buch
In this book, we change the perspective on an organizationâ s operational resilience capabilities so that it changes from being a reactive (tick box) approach to being proactive. The perspectives of every chapter in this book are with a focus on risk profiles and how your business can reduce these profiles using effective mitigation measures.
Andere Kunden interessierten sich auch für
- Sarath JayanathaGrowth Hormone Gene Expression of Siberian sturgeon in Aquaculture26,99 €
- Derek SlatonThe Atari 2600 Encyclopedia Volume 233,99 €
- Max BrandA Sagebrush Cinderella10,99 €
- Laura Verónica Márquez ZetinaAfmetingen van cybercriminaliteit18,99 €
- Gertrude AthertonBlack Oxen (Esprios Classics)29,99 €
- Dana CameronExit Interview15,99 €
- Thomas Kingsley TroupeCan You Discover the Lost Dutchman's Gold Mine?29,99 €
-
-
-
-
-
-
-
-
-
In this book, we change the perspective on an organizationâ s operational resilience capabilities so that it changes from being a reactive (tick box) approach to being proactive. The perspectives of every chapter in this book are with a focus on risk profiles and how your business can reduce these profiles using effective mitigation measures.
Produktdetails
- Produktdetails
- Security, Audit and Leadership Series
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 274
- Erscheinungstermin: 31. August 2023
- Englisch
- Abmessung: 154mm x 235mm x 19mm
- Gewicht: 444g
- ISBN-13: 9781032263892
- ISBN-10: 103226389X
- Artikelnr.: 68100798
- Security, Audit and Leadership Series
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 274
- Erscheinungstermin: 31. August 2023
- Englisch
- Abmessung: 154mm x 235mm x 19mm
- Gewicht: 444g
- ISBN-13: 9781032263892
- ISBN-10: 103226389X
- Artikelnr.: 68100798
Jim Seaman honed his skills and craft during a 22-year career in the Royal Air Force Police, with the final decade being employed on Counter Intelligence, Computer Security, Counter Terrorism and Risk Management duties. On completion of his 22-years of military service, he sought the new challenge of transferring his specialist skills and knowledge across to the corporate sector. In the decade since transitioning across to the corporate environment, he has fulfilled roles within Payment Card Industry Data Security Standard (PCI D)SS compliance, data protection, information security, industrial systems security and risk management. In the past few years, he has sought to further develop his knowledge and to rise to the challenge of authoring two books, one on the subject of PCI DSS (published May 2020) and the other on Protective Security (published Apr 2021). Michael Gioia is an information security leader with over 18 years of experience delivering security solutions across several industries. He has served as an officer in the United States Air Force and worked in higher education, the Department of Defense, retail food services, and security consulting. He has performed most of his information security work within higher education, currently, as the Chief Information Security Officer (CISO) for Babson College and formerly as the Information Security Officer (ISO) at Eastern Illinois University, Rose-Hulman Institute of Technology, and Bentley University. He retains various professional certifications that include a Certified Information Security Manager (CISM) and Certified Data Privacy Solutions Engineer (CDPSE) from ISACA, Certified Information System Security Professional (CISSP) from ISC2, GIAC Security Leadership Certification (GSLC) from SANS, and Payment Card Industry Professional (PCIP) from the PCI Security Standards Council.
Section One: Security Risk Management Reducing the Likelihood/Probability
1. Finagling Your Business
2. Business Impact Analysis
3. Asset Management
4. Risk-Based Vulnerability Management
5. Threat Management
6. Risk Scenarios
7. Quality Versus Quantity
8. Developing a Risk Culture
9. Risk-Enabling the Human Firewall
10. Risk-Based Security Operations
11. Creating Visibility and Insights Through Effective Security Risk Metrics
Section Two: Survive to Operate: Reducing the Impacts/Consequences
12. Security Incident Management
13. Business Continuity Management
14. Disaster Recovery Management
1. Finagling Your Business
2. Business Impact Analysis
3. Asset Management
4. Risk-Based Vulnerability Management
5. Threat Management
6. Risk Scenarios
7. Quality Versus Quantity
8. Developing a Risk Culture
9. Risk-Enabling the Human Firewall
10. Risk-Based Security Operations
11. Creating Visibility and Insights Through Effective Security Risk Metrics
Section Two: Survive to Operate: Reducing the Impacts/Consequences
12. Security Incident Management
13. Business Continuity Management
14. Disaster Recovery Management
Section One: Security Risk Management Reducing the Likelihood/Probability
1. Finagling Your Business
2. Business Impact Analysis
3. Asset Management
4. Risk-Based Vulnerability Management
5. Threat Management
6. Risk Scenarios
7. Quality Versus Quantity
8. Developing a Risk Culture
9. Risk-Enabling the Human Firewall
10. Risk-Based Security Operations
11. Creating Visibility and Insights Through Effective Security Risk Metrics
Section Two: Survive to Operate: Reducing the Impacts/Consequences
12. Security Incident Management
13. Business Continuity Management
14. Disaster Recovery Management
1. Finagling Your Business
2. Business Impact Analysis
3. Asset Management
4. Risk-Based Vulnerability Management
5. Threat Management
6. Risk Scenarios
7. Quality Versus Quantity
8. Developing a Risk Culture
9. Risk-Enabling the Human Firewall
10. Risk-Based Security Operations
11. Creating Visibility and Insights Through Effective Security Risk Metrics
Section Two: Survive to Operate: Reducing the Impacts/Consequences
12. Security Incident Management
13. Business Continuity Management
14. Disaster Recovery Management