Image from Google Jackets

How to Manage Cybersecurity Risk: A Security Leader's Roadmap with Open FAIR

By: Publication details: Irvine: BrownWalker Press, 2019Description: 283ISBN:
  • 9781627342766
Subject(s): DDC classification:
  • 005.8 CAR
Summary: Protecting information systems to reduce the risk of security incidents is critical for organizations today. This writing provides instruction for security leaders on the processes and techniques for managing a security program. It contains practical information on the breadth of information security topics, referring to many other writings that provide details on technical security topics. This provides foundation for a security program responsive to technology developments and an evolving threat environment. The security leader may be engaged by an organization that is in crisis, where the priority action is to recover from a serious incident. This work offers foundation knowledge for the security leader to immediately apply to the organization's security program while improving it to the next level, organized by development stage: • Reactive--focused on incident detection and response • Planned--control requirements, compliance and reporting • Managed--integrated security business processes The security leader must also communicate with the organization executive, whose focus is on results such as increasing revenues or reducing costs. The security leader may initially be welcomed as the wizard who applies mysterious skills to resolve an embarrassing incident. But the organization executive will lose patience with a perpetual crisis and demand concrete results. This writing explains how to communicate in terms executives understand.
List(s) this item appears in: New Arrivals for the Month of October - 2023 | New Arrivals March 2025 - Engineering | New Arrivals April 2025 - Liberal Arts
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Copy number Status Date due Barcode Item holds
Book Book ACED Computer Science and Information Technology 005.8 CAR (Browse shelf(Opens below)) Available E15686
Reference Book Reference Book ACED Computer Science and Information Technology 005.8 CAR (Browse shelf(Opens below)) Not for loan E12712
Reference Book Reference Book ACED Computer Science and Information Technology 005.8 CAR (Browse shelf(Opens below)) Not for loan E12713
Reference Book Reference Book ACED On Display Computer Science and Information Technology 005.8 CAR (Browse shelf(Opens below)) 1 Not for loan E11251
Book Book Alliance School of Liberal Arts and Humanities Computer Science and Information Technology 005.8 CAR (Browse shelf(Opens below)) Available LA04927
Total holds: 0

Protecting information systems to reduce the risk of security incidents is critical for organizations today. This writing provides instruction for security leaders on the processes and techniques for managing a security program. It contains practical information on the breadth of information security topics, referring to many other writings that provide details on technical security topics. This provides foundation for a security program responsive to technology developments and an evolving threat environment.

The security leader may be engaged by an organization that is in crisis, where the priority action is to recover from a serious incident. This work offers foundation knowledge for the security leader to immediately apply to the organization's security program while improving it to the next level, organized by development stage:
• Reactive--focused on incident detection and response
• Planned--control requirements, compliance and reporting
• Managed--integrated security business processes
The security leader must also communicate with the organization executive, whose focus is on results such as increasing revenues or reducing costs. The security leader may initially be welcomed as the wizard who applies mysterious skills to resolve an embarrassing incident. But the organization executive will lose patience with a perpetual crisis and demand concrete results. This writing explains how to communicate in terms executives understand.

There are no comments on this title.

to post a comment.