Jim Seaman, Michael Gioia
Security Risk Management - The Driving Force for Operational Resilience
The Firefighting Paradox
Jim Seaman, Michael Gioia
Security Risk Management - The Driving Force for Operational Resilience
The Firefighting Paradox
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
In this book, we change the perspective on an organization's operational resilience capabilities so that it changes from being a reactive (tick box) approach to being proactive. The perspectives of every chapter in this book are with a focus on risk profiles and how your business can reduce these profiles using effective mitigation measures.
Andere Kunden interessierten sich auch für
- F. Scott FitzgeraldFLAPPERS AND PHILOSOPHERS17,99 €
- Almira NagimovaISLAMIC FINANCE IN THE CIS COUNTRIES26,99 €
- Eva CidTras esa montaña está la orilla21,99 €
- Eberto Rafael Ortega SinningZonage géotechnique SIG des sols de Valledupar, Col.26,99 €
- William DameronThe Way Life Should Be11,99 €
- Erica RidleyAn Affair by the Sea16,99 €
- Paul K. LarnerOur Railroad27,99 €
-
-
-
-
-
-
-
-
-
-
-
-
In this book, we change the perspective on an organization's operational resilience capabilities so that it changes from being a reactive (tick box) approach to being proactive. The perspectives of every chapter in this book are with a focus on risk profiles and how your business can reduce these profiles using effective mitigation measures.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis Ltd (Sales)
- Seitenzahl: 274
- Erscheinungstermin: 31. August 2023
- Englisch
- Abmessung: 234mm x 156mm x 18mm
- Gewicht: 581g
- ISBN-13: 9781032263885
- ISBN-10: 1032263881
- Artikelnr.: 68101642
- Verlag: Taylor & Francis Ltd (Sales)
- Seitenzahl: 274
- Erscheinungstermin: 31. August 2023
- Englisch
- Abmessung: 234mm x 156mm x 18mm
- Gewicht: 581g
- ISBN-13: 9781032263885
- ISBN-10: 1032263881
- Artikelnr.: 68101642
Jim Seaman honed his skills and craft during a 22-year career in the Royal Air Force Police, with the final decade being employed on Counter Intelligence, Computer Security, Counter Terrorism and Risk Management duties. On completion of his 22-years of military service, he sought the new challenge of transferring his specialist skills and knowledge across to the corporate sector. In the decade since transitioning across to the corporate environment, he has fulfilled roles within Payment Card Industry Data Security Standard (PCI D)SS compliance, data protection, information security, industrial systems security and risk management. In the past few years, he has sought to further develop his knowledge and to rise to the challenge of authoring two books, one on the subject of PCI DSS (published May 2020) and the other on Protective Security (published Apr 2021). Michael Gioia is an information security leader with over 18 years of experience delivering security solutions across several industries. He has served as an officer in the United States Air Force and worked in higher education, the Department of Defense, retail food services, and security consulting. He has performed most of his information security work within higher education, currently, as the Chief Information Security Officer (CISO) for Babson College and formerly as the Information Security Officer (ISO) at Eastern Illinois University, Rose-Hulman Institute of Technology, and Bentley University. He retains various professional certifications that include a Certified Information Security Manager (CISM) and Certified Data Privacy Solutions Engineer (CDPSE) from ISACA, Certified Information System Security Professional (CISSP) from ISC2, GIAC Security Leadership Certification (GSLC) from SANS, and Payment Card Industry Professional (PCIP) from the PCI Security Standards Council.
Section One: Security Risk Management Reducing the Likelihood/Probability
1. Finagling Your Business
2. Business Impact Analysis
3. Asset Management
4. Risk-Based Vulnerability Management
5. Threat Management
6. Risk Scenarios
7. Quality Versus Quantity
8. Developing a Risk Culture
9. Risk-Enabling the Human Firewall
10. Risk-Based Security Operations
11. Creating Visibility and Insights Through Effective Security Risk Metrics
Section Two: Survive to Operate: Reducing the Impacts/Consequences
12. Security Incident Management
13. Business Continuity Management
14. Disaster Recovery Management
1. Finagling Your Business
2. Business Impact Analysis
3. Asset Management
4. Risk-Based Vulnerability Management
5. Threat Management
6. Risk Scenarios
7. Quality Versus Quantity
8. Developing a Risk Culture
9. Risk-Enabling the Human Firewall
10. Risk-Based Security Operations
11. Creating Visibility and Insights Through Effective Security Risk Metrics
Section Two: Survive to Operate: Reducing the Impacts/Consequences
12. Security Incident Management
13. Business Continuity Management
14. Disaster Recovery Management
Section One: Security Risk Management Reducing the Likelihood/Probability, 1. Finagling Your Business, 2. Business Impact Analysis, 3. Asset Management, 4. Risk-Based Vulnerability Management, 5. Threat Management, 6. Risk Scenarios, 7. Quality Versus Quantity, 8. Developing a Risk Culture, 9. Risk-Enabling the Human Firewall, 10. Risk-Based Security Operations, 11. Creating Visibility and Insights Through Effective Security Risk Metrics, Section Two: Survive to Operate: Reducing the Impacts/Consequences, 12. Security Incident Management, 13. Business Continuity Management, 14. Disaster Recovery Management
Section One: Security Risk Management Reducing the Likelihood/Probability
1. Finagling Your Business
2. Business Impact Analysis
3. Asset Management
4. Risk-Based Vulnerability Management
5. Threat Management
6. Risk Scenarios
7. Quality Versus Quantity
8. Developing a Risk Culture
9. Risk-Enabling the Human Firewall
10. Risk-Based Security Operations
11. Creating Visibility and Insights Through Effective Security Risk Metrics
Section Two: Survive to Operate: Reducing the Impacts/Consequences
12. Security Incident Management
13. Business Continuity Management
14. Disaster Recovery Management
1. Finagling Your Business
2. Business Impact Analysis
3. Asset Management
4. Risk-Based Vulnerability Management
5. Threat Management
6. Risk Scenarios
7. Quality Versus Quantity
8. Developing a Risk Culture
9. Risk-Enabling the Human Firewall
10. Risk-Based Security Operations
11. Creating Visibility and Insights Through Effective Security Risk Metrics
Section Two: Survive to Operate: Reducing the Impacts/Consequences
12. Security Incident Management
13. Business Continuity Management
14. Disaster Recovery Management
Section One: Security Risk Management Reducing the Likelihood/Probability, 1. Finagling Your Business, 2. Business Impact Analysis, 3. Asset Management, 4. Risk-Based Vulnerability Management, 5. Threat Management, 6. Risk Scenarios, 7. Quality Versus Quantity, 8. Developing a Risk Culture, 9. Risk-Enabling the Human Firewall, 10. Risk-Based Security Operations, 11. Creating Visibility and Insights Through Effective Security Risk Metrics, Section Two: Survive to Operate: Reducing the Impacts/Consequences, 12. Security Incident Management, 13. Business Continuity Management, 14. Disaster Recovery Management