How to Manage Cybersecurity Risk: A Security Leader's Roadmap with Open FAIR (Record no. 42323)

MARC details
000 -LEADER
fixed length control field 01982 a2200181 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250320145557.0
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781627342766
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8 CAR
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Carlson, Christopher T
245 ## - TITLE STATEMENT
Title How to Manage Cybersecurity Risk: A Security Leader's Roadmap with Open FAIR
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Irvine
Name of publisher, distributor, etc BrownWalker Press
Date of publication, distribution, etc 2019
300 ## - PHYSICAL DESCRIPTION
Extent 283
520 ## - SUMMARY, ETC.
Summary, etc Protecting information systems to reduce the risk of security incidents is critical for organizations today. This writing provides instruction for security leaders on the processes and techniques for managing a security program. It contains practical information on the breadth of information security topics, referring to many other writings that provide details on technical security topics. This provides foundation for a security program responsive to technology developments and an evolving threat environment.<br/><br/>The security leader may be engaged by an organization that is in crisis, where the priority action is to recover from a serious incident. This work offers foundation knowledge for the security leader to immediately apply to the organization's security program while improving it to the next level, organized by development stage:<br/>• Reactive--focused on incident detection and response<br/>• Planned--control requirements, compliance and reporting<br/>• Managed--integrated security business processes<br/>The security leader must also communicate with the organization executive, whose focus is on results such as increasing revenues or reducing costs. The security leader may initially be welcomed as the wizard who applies mysterious skills to resolve an embarrassing incident. But the organization executive will lose patience with a perpetual crisis and demand concrete results. This writing explains how to communicate in terms executives understand.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer Security-Standards
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer crimes Risk Assessment Standards
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Open FAIR
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Book

No items available.