Jim Seaman, Michael Gioia
Security Risk Management - The Driving Force for Operational Resilience (eBook, PDF)
The Firefighting Paradox
47,95 €
47,95 €
inkl. MwSt.
Sofort per Download lieferbar
24 °P sammeln
47,95 €
Als Download kaufen
47,95 €
inkl. MwSt.
Sofort per Download lieferbar
24 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
47,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
24 °P sammeln
Jim Seaman, Michael Gioia
Security Risk Management - The Driving Force for Operational Resilience (eBook, PDF)
The Firefighting Paradox
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
In this book, we change the perspective on an organization's operational resilience capabilities so that it changes from being a reactive (tick box) approach to being proactive. The perspectives of every chapter in this book are with a focus on risk profiles and how your business can reduce these profiles using effective mitigation measures.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 43.92MB
Andere Kunden interessierten sich auch für
- Jim SeamanSecurity Risk Management - The Driving Force for Operational Resilience (eBook, ePUB)47,95 €
- Douglas LandollThe Security Risk Assessment Handbook (eBook, PDF)62,95 €
- William L. JenningsFraud Investigation and Forensic Accounting in the Real World (eBook, PDF)47,95 €
- David X MartinCyRM (eBook, PDF)36,95 €
- Robert SladeCybersecurity Lessons from CoVID-19 (eBook, PDF)21,95 €
- Douglas LandollThe Security Risk Assessment Handbook (eBook, ePUB)62,95 €
- M. E. KabayThe Expert in the Next Office (eBook, PDF)73,95 €
-
-
-
In this book, we change the perspective on an organization's operational resilience capabilities so that it changes from being a reactive (tick box) approach to being proactive. The perspectives of every chapter in this book are with a focus on risk profiles and how your business can reduce these profiles using effective mitigation measures.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis
- Seitenzahl: 288
- Erscheinungstermin: 31. August 2023
- Englisch
- ISBN-13: 9781000918908
- Artikelnr.: 68429721
- Verlag: Taylor & Francis
- Seitenzahl: 288
- Erscheinungstermin: 31. August 2023
- Englisch
- ISBN-13: 9781000918908
- Artikelnr.: 68429721
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Jim Seaman honed his skills and craft during a 22-year career in the Royal Air Force Police, with the final decade being employed on Counter Intelligence, Computer Security, Counter Terrorism and Risk Management duties. On completion of his 22-years of military service, he sought the new challenge of transferring his specialist skills and knowledge across to the corporate sector. In the decade since transitioning across to the corporate environment, he has fulfilled roles within Payment Card Industry Data Security Standard (PCI D)SS compliance, data protection, information security, industrial systems security and risk management. In the past few years, he has sought to further develop his knowledge and to rise to the challenge of authoring two books, one on the subject of PCI DSS (published May 2020) and the other on Protective Security (published Apr 2021).
Michael Gioia is an information security leader with over 18 years of experience delivering security solutions across several industries. He has served as an officer in the United States Air Force and worked in higher education, the Department of Defense, retail food services, and security consulting. He has performed most of his information security work within higher education, currently, as the Chief Information Security Officer (CISO) for Babson College and formerly as the Information Security Officer (ISO) at Eastern Illinois University, Rose-Hulman Institute of Technology, and Bentley University. He retains various professional certifications that include a Certified Information Security Manager (CISM) and Certified Data Privacy Solutions Engineer (CDPSE) from ISACA, Certified Information System Security Professional (CISSP) from ISC2, GIAC Security Leadership Certification (GSLC) from SANS, and Payment Card Industry Professional (PCIP) from the PCI Security Standards Council.
Michael Gioia is an information security leader with over 18 years of experience delivering security solutions across several industries. He has served as an officer in the United States Air Force and worked in higher education, the Department of Defense, retail food services, and security consulting. He has performed most of his information security work within higher education, currently, as the Chief Information Security Officer (CISO) for Babson College and formerly as the Information Security Officer (ISO) at Eastern Illinois University, Rose-Hulman Institute of Technology, and Bentley University. He retains various professional certifications that include a Certified Information Security Manager (CISM) and Certified Data Privacy Solutions Engineer (CDPSE) from ISACA, Certified Information System Security Professional (CISSP) from ISC2, GIAC Security Leadership Certification (GSLC) from SANS, and Payment Card Industry Professional (PCIP) from the PCI Security Standards Council.
Section One: Security Risk Management Reducing the Likelihood/Probability
1. Finagling Your Business
2. Business Impact Analysis
3. Asset Management
4. Risk-Based Vulnerability Management
5. Threat Management
6. Risk Scenarios
7. Quality Versus Quantity
8. Developing a Risk Culture
9. Risk-Enabling the Human Firewall
10. Risk-Based Security Operations
11. Creating Visibility and Insights Through Effective Security Risk Metrics
Section Two: Survive to Operate: Reducing the Impacts/Consequences
12. Security Incident Management
13. Business Continuity Management
14. Disaster Recovery Management
1. Finagling Your Business
2. Business Impact Analysis
3. Asset Management
4. Risk-Based Vulnerability Management
5. Threat Management
6. Risk Scenarios
7. Quality Versus Quantity
8. Developing a Risk Culture
9. Risk-Enabling the Human Firewall
10. Risk-Based Security Operations
11. Creating Visibility and Insights Through Effective Security Risk Metrics
Section Two: Survive to Operate: Reducing the Impacts/Consequences
12. Security Incident Management
13. Business Continuity Management
14. Disaster Recovery Management
Section One: Security Risk Management Reducing the Likelihood/Probability, 1. Finagling Your Business, 2. Business Impact Analysis, 3. Asset Management, 4. Risk-Based Vulnerability Management, 5. Threat Management, 6. Risk Scenarios, 7. Quality Versus Quantity, 8. Developing a Risk Culture, 9. Risk-Enabling the Human Firewall, 10. Risk-Based Security Operations, 11. Creating Visibility and Insights Through Effective Security Risk Metrics, Section Two: Survive to Operate: Reducing the Impacts/Consequences, 12. Security Incident Management, 13. Business Continuity Management, 14. Disaster Recovery Management
Section One: Security Risk Management Reducing the Likelihood/Probability
1. Finagling Your Business
2. Business Impact Analysis
3. Asset Management
4. Risk-Based Vulnerability Management
5. Threat Management
6. Risk Scenarios
7. Quality Versus Quantity
8. Developing a Risk Culture
9. Risk-Enabling the Human Firewall
10. Risk-Based Security Operations
11. Creating Visibility and Insights Through Effective Security Risk Metrics
Section Two: Survive to Operate: Reducing the Impacts/Consequences
12. Security Incident Management
13. Business Continuity Management
14. Disaster Recovery Management
1. Finagling Your Business
2. Business Impact Analysis
3. Asset Management
4. Risk-Based Vulnerability Management
5. Threat Management
6. Risk Scenarios
7. Quality Versus Quantity
8. Developing a Risk Culture
9. Risk-Enabling the Human Firewall
10. Risk-Based Security Operations
11. Creating Visibility and Insights Through Effective Security Risk Metrics
Section Two: Survive to Operate: Reducing the Impacts/Consequences
12. Security Incident Management
13. Business Continuity Management
14. Disaster Recovery Management
Section One: Security Risk Management Reducing the Likelihood/Probability, 1. Finagling Your Business, 2. Business Impact Analysis, 3. Asset Management, 4. Risk-Based Vulnerability Management, 5. Threat Management, 6. Risk Scenarios, 7. Quality Versus Quantity, 8. Developing a Risk Culture, 9. Risk-Enabling the Human Firewall, 10. Risk-Based Security Operations, 11. Creating Visibility and Insights Through Effective Security Risk Metrics, Section Two: Survive to Operate: Reducing the Impacts/Consequences, 12. Security Incident Management, 13. Business Continuity Management, 14. Disaster Recovery Management