Enterprise Security Risk Management: Concepts and Applications

Språk
Engelsk
Format
Kategori

Økonomi og ledelse

As a security professional, have you found that you and others in your company do not always define “security” the same way? Perhaps security interests and business interests have become misaligned. Brian Allen and Rachelle Loyear offer a new approach: Enterprise Security Risk Management (ESRM). By viewing security through a risk management lens, ESRM can help make you and your security program successful.

In their long-awaited book, based on years of practical experience and research, Brian Allen and Rachelle Loyear show you step-by-step how Enterprise Security Risk Management (ESRM) applies fundamental risk principles to manage all security risks. Whether the risks are informational, cyber, physical security, asset management, or business continuity, all are included in the holistic, all-encompassing ESRM approach which will move you from task-based to risk-based security.

How is ESRM familiar? As a security professional, you may already practice some of the components of ESRM. Many of the concepts – such as risk identification, risk transfer and acceptance, crisis management, and incident response – will be well known to you. How is ESRM new? While many of the principles are familiar, the authors have identified few organizations that apply them in the comprehensive, holistic way that ESRM represents – and even fewer that communicate these principles effectively to key decision-makers. How is ESRM practical? ESRM offers you a straightforward, realistic, actionable approach to deal effectively with all the distinct types of security risks facing you as a security practitioner. ESRM is performed in a life cycle of risk management including: Asset assessment and prioritization. Risk assessment and prioritization. Risk treatment (mitigation). Continuous improvement.

Throughout Enterprise Security Risk Management: Concepts and Applications, the authors give you the tools and materials that will help you advance you in the security field, no matter if you are a student, a newcomer, or a seasoned professional. Included are realistic case studies, questions to help you assess your own security program, thought-provoking discussion questions, useful figures and tables, and references for your further reading.

By redefining how everyone thinks about the role of security in the enterprise, your security organization can focus on working in partnership with business leaders and other key stakeholders to identify and mitigate security risks. As you begin to use ESRM, following the instructions in this book, you will experience greater personal and professional satisfaction as a security professional – and you’ll become a recognized and trusted partner in the business-critical effort of protecting your enterprise and all its assets.

© 2017 Rothstein Publishing (E-bok): 9781944480424

Utgivelsesdato

E-bok: 29. november 2017

Andre liker også ...

  1. China's New Normal: How China sets the standard for innovation
    China's New Normal: How China sets the standard for innovation Coppens Pascal
  2. Pricing Lives: Guideposts for a Safer Society
    Pricing Lives: Guideposts for a Safer Society W. Kip Viscusi
  3. GPS for Success: Skills, Strategies, and Secrets of Superachievers
    GPS for Success: Skills, Strategies, and Secrets of Superachievers Barry A. Franklin
  4. View From the Top: An Inside Look at How People in Power See and Shape the World
    View From the Top: An Inside Look at How People in Power See and Shape the World D. Michael Lindsay
  5. Cracking Corporate
    Cracking Corporate Matthew Butler-Adam
  6. Leadership by Design: A guide to transform you as a leader
    Leadership by Design: A guide to transform you as a leader Aga Szòstek
  7. Untapped Agility: Seven Leadership Moves to Take Your Transformation to the Next Level
    Untapped Agility: Seven Leadership Moves to Take Your Transformation to the Next Level Jesse Fewell
  8. A Joosr Guide to... The Innovators by Walter Isaacson: How a Group of Hackers, Geniuses and Geeks Created the Digital Revolution
    A Joosr Guide to... The Innovators by Walter Isaacson: How a Group of Hackers, Geniuses and Geeks Created the Digital Revolution Joosr
  9. The New 'Sharing Economy' can enrich
    The New 'Sharing Economy' can enrich PBS NewsHour
  10. Information Choice in Macroeconomics and Finance
    Information Choice in Macroeconomics and Finance Laura L. Veldkamp
  11. Secrets of Next-Level Entrepreneurs: 11 Powerful Lessons to Thrive in Business and Lead a Balanced Life
    Secrets of Next-Level Entrepreneurs: 11 Powerful Lessons to Thrive in Business and Lead a Balanced Life Alex Brueckmann
  12. WORKBOOK of The Cold Start Problem: How to Start and Scale Network Effects by Andrew Chen
    WORKBOOK of The Cold Start Problem: How to Start and Scale Network Effects by Andrew Chen BOOK TIGERS
  13. AI and the Future of the Public Sector: The Creation of Public Sector 4.0
    AI and the Future of the Public Sector: The Creation of Public Sector 4.0 Tony Boobier
  14. #Republic: Divided Democracy in the Age of Social Media
    #Republic: Divided Democracy in the Age of Social Media Cass R. Sunstein
  15. Financial Crises, Liquidity, and the International Monetary System
    Financial Crises, Liquidity, and the International Monetary System Jean Tirole
  16. Graduate Debt Free: Escaping the Student Loan Matrix
    Graduate Debt Free: Escaping the Student Loan Matrix David F. Shutler, JD, MBA
  17. A Joosr Guide to... Business Adventures by John Brooks: Twelve Classic Tales from the World of Wall Street
    A Joosr Guide to... Business Adventures by John Brooks: Twelve Classic Tales from the World of Wall Street Joosr
  18. Cryptocurrency Trading Guide for Beginners: A Practical book for Entry-Level Cryptocurrency Traders
    Cryptocurrency Trading Guide for Beginners: A Practical book for Entry-Level Cryptocurrency Traders Rayan Murray
  19. Econometrics
    Econometrics Fumio Hayashi
  20. Calculus of Variations and Optimal Control Theory: A Concise Introduction
    Calculus of Variations and Optimal Control Theory: A Concise Introduction Daniel Liberzon
  21. Demand the Impossible: One Lawyer's Pursuit of Equal Justice for All
    Demand the Impossible: One Lawyer's Pursuit of Equal Justice for All Robert Tsai
  22. The Micro-Lending Revolution
    The Micro-Lending Revolution Muhammad Yunus
  23. Multipolarity After Ukraine: Old Wine in New Bottles?
    Multipolarity After Ukraine: Old Wine in New Bottles? Aldo Ferrari

Derfor vil du elske Storytel:

  • Over 700 000 lydbøker og e-bøker

  • Eksklusive nyheter hver uke

  • Lytt og les offline

  • Kids Mode (barnevennlig visning)

  • Avslutt når du vil

Det mest populære valget

Unlimited

For deg som vil lytte og lese ubegrenset.

219 kr /måned
  • 1 konto

  • Ubegrenset lytting

  • Lytt så mye du vil

  • Over 700 000 bøker

  • Nye eksklusive bøker hver uke

  • Avslutt når du vil

Benytt tilbud
Familiens førstevalg

Family

For deg som ønsker å dele historier med familien.

Fra 289 kr/måned
  • 2-3 kontoer

  • Ubegrenset lytting

  • Lytt så mye du vil

  • Over 700 000 bøker

  • Nye eksklusive bøker hver uke

  • Avslutt når du vil

2 kontoer

289 kr /måned
Benytt tilbud

Basic

For deg som lytter og leser av og til.

149 kr /måned
  • 1 konto

  • 20 timer/måned

  • Lytt opp til 20 timer per måned

  • Over 700 000 bøker

  • Nye eksklusive bøker hver uke

  • Avslutt når du vil

Benytt tilbud

Lytt og les ubegrenset

Kos deg med ubegrenset tilgang til mer enn 700 000 titler.

  • Lytt og les så mye du vil
  • Utforsk et stort bibliotek med fortellinger
  • Over 1500 serier på norsk
  • Ingen bindingstid, avslutt når du vil
Start tilbud
NO - Details page - Device banner - 894x1036
Cover for Enterprise Security Risk Management: Concepts and Applications