In this book, we change the perspective on an organization's operational resilience capabilities so that it changes from being a reactive (tick box) approach to being proactive. The perspectives of every chapter in this book are with a focus on risk profiles and how your business can reduce these profiles using effective mitigation measures.
In this book, we change the perspective on an organization's operational resilience capabilities so that it changes from being a reactive (tick box) approach to being proactive. The perspectives of every chapter in this book are with a focus on risk profiles and how your business can reduce these profiles using effective mitigation measures.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Jim Seaman honed his skills and craft during a 22-year career in the Royal Air Force Police, with the final decade being employed on Counter Intelligence, Computer Security, Counter Terrorism and Risk Management duties. On completion of his 22-years of military service, he sought the new challenge of transferring his specialist skills and knowledge across to the corporate sector. In the decade since transitioning across to the corporate environment, he has fulfilled roles within Payment Card Industry Data Security Standard (PCI D)SS compliance, data protection, information security, industrial systems security and risk management. In the past few years, he has sought to further develop his knowledge and to rise to the challenge of authoring two books, one on the subject of PCI DSS (published May 2020) and the other on Protective Security (published Apr 2021). Michael Gioia is an information security leader with over 18 years of experience delivering security solutions across several industries. He has served as an officer in the United States Air Force and worked in higher education, the Department of Defense, retail food services, and security consulting. He has performed most of his information security work within higher education, currently, as the Chief Information Security Officer (CISO) for Babson College and formerly as the Information Security Officer (ISO) at Eastern Illinois University, Rose-Hulman Institute of Technology, and Bentley University. He retains various professional certifications that include a Certified Information Security Manager (CISM) and Certified Data Privacy Solutions Engineer (CDPSE) from ISACA, Certified Information System Security Professional (CISSP) from ISC2, GIAC Security Leadership Certification (GSLC) from SANS, and Payment Card Industry Professional (PCIP) from the PCI Security Standards Council.
Inhaltsangabe
Section One: Security Risk Management Reducing the Likelihood/Probability 1. Finagling Your Business 2. Business Impact Analysis 3. Asset Management 4. Risk-Based Vulnerability Management 5. Threat Management 6. Risk Scenarios 7. Quality Versus Quantity 8. Developing a Risk Culture 9. Risk-Enabling the Human Firewall 10. Risk-Based Security Operations 11. Creating Visibility and Insights Through Effective Security Risk Metrics Section Two: Survive to Operate: Reducing the Impacts/Consequences 12. Security Incident Management 13. Business Continuity Management 14. Disaster Recovery Management
Section One: Security Risk Management Reducing the Likelihood/Probability, 1. Finagling Your Business, 2. Business Impact Analysis, 3. Asset Management, 4. Risk-Based Vulnerability Management, 5. Threat Management, 6. Risk Scenarios, 7. Quality Versus Quantity, 8. Developing a Risk Culture, 9. Risk-Enabling the Human Firewall, 10. Risk-Based Security Operations, 11. Creating Visibility and Insights Through Effective Security Risk Metrics, Section Two: Survive to Operate: Reducing the Impacts/Consequences, 12. Security Incident Management, 13. Business Continuity Management, 14. Disaster Recovery Management