Managing Risk and Information Security: Protect to Enable 2nd edition by Malcolm Harkins – Ebook PDF Instant Download/Delivery. 1484214560 978-1484214565
Full download Managing Risk and Information Security: Protect to Enable 2nd edition after payment

Product details:
ISBN 10: 1484214560
ISBN 13: 978-1484214565
Author: Malcolm Harkins
Examine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on the author’s experience and insights at major companies where he has served as CISO and CSPO, the book also includes many examples from other well-known companies and provides guidance for a management-level audience.
Managing Risk and Information Security provides thought leadership in the increasingly important area of enterprise information risk and security. It describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology not only for internal operations but increasing as a part of product or service creation, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk.
This edition discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities and offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologies―such as social media and the huge proliferation of Internet-enabled devices―while minimizing risk.
What You’ll Learn
- Review how people perceive risk and the effects it has on information security
- See why different perceptions of risk within an organization matters
- Understand and reconcile these differing risk views
- Gain insights into how to safely enable the use of new technologies
Who This Book Is For
The primary audience is CIOs and other IT leaders, CISOs and other information security leaders, IT auditors, and other leaders of corporate governance and risk functions. The secondary audience is CEOs, board members, privacy professionals, and less senior-level information security and risk professionals.
“Harkins’ logical, methodical approach as a CISO to solving the most complex cybersecurity problems is reflected in the lucid style of this book. His enlightened approach to intelligence-based security infrastructure and risk mitigation is our best path forward if we are ever to realize the vast potential of the innovative digital world we are creating while reducing the threats to manageable levels. The author shines a light on that path in a comprehensive yet very readable way.” ―Art Coviello, Former CEO and Executive Chairman, RSA
Managing Risk and Information Security: Protect to Enable 2nd Table of contents:
-
Introduction to Information Security and Risk Management
- Defining information security and its importance in the modern world.
- Introduction to risk management and how it relates to cybersecurity.
- The role of information security in protecting business assets and reputation.
-
Understanding Risk in the Context of Information Security
- Identifying and assessing risks to information systems and data.
- Frameworks and methodologies for conducting risk assessments.
- Quantitative vs qualitative risk analysis.
-
The Risk Management Process
- Key steps in the risk management process: identification, assessment, response, and monitoring.
- Risk mitigation strategies: avoiding, transferring, accepting, and reducing risk.
- Establishing risk tolerance levels and aligning security practices with business objectives.
-
Governance, Risk, and Compliance (GRC)
- The role of governance in risk management.
- Introduction to compliance regulations (e.g., GDPR, HIPAA, SOX).
- Ensuring organizational adherence to legal and regulatory standards.
-
Information Security Policies and Frameworks
- Developing and implementing security policies to protect information assets.
- Overview of information security frameworks (e.g., NIST, ISO 27001).
- Best practices for aligning security policies with organizational goals.
-
Threats and Vulnerabilities
- Common cybersecurity threats: malware, phishing, insider threats, etc.
- Identifying system vulnerabilities and weaknesses that can be exploited.
- The role of threat intelligence in strengthening defenses.
-
Data Protection and Privacy
- Techniques for securing data: encryption, access controls, and backups.
- The importance of data privacy and compliance with privacy laws.
- Addressing privacy concerns in the digital age.
-
Building a Security Culture
- Promoting a security-aware culture within an organization.
- Training and educating employees on security best practices.
- The role of leadership in fostering a security-conscious environment.
-
Incident Response and Business Continuity
- Developing an incident response plan to handle security breaches.
- The relationship between risk management and business continuity planning.
- Ensuring rapid recovery and minimizing downtime after an incident.
-
Emerging Technologies and Risks
- New and emerging technologies and the risks they introduce (e.g., AI, IoT, cloud computing).
- How to assess and manage risks related to the adoption of emerging technologies.
- Securing next-generation infrastructures and systems.
-
Security Controls and Mitigation Strategies
- Technical controls for protecting systems and data: firewalls, antivirus, intrusion detection systems.
- Administrative controls and procedures to reduce risk.
- Evaluating the effectiveness of security controls and continuous improvement.
-
Measuring and Reporting Risk
- Key performance indicators (KPIs) for risk management success.
- Techniques for reporting risk to senior leadership and stakeholders.
- Best practices for ensuring transparent and actionable risk reports.
-
Future Trends in Risk Management and Information Security
- The evolving landscape of information security and risk management.
- The impact of artificial intelligence, machine learning, and automation on security.
- Preparing for future challenges in cybersecurity and risk management.
-
Conclusion: Aligning Security with Business Objectives
- The need for a strategic approach to information security.
- Balancing security efforts with business operations and goals.
- Final thoughts on building an adaptive and resilient risk management program.
People also search for Managing Risk and Information Security: Protect to Enable 2nd:
managing risk and information security protect to enable
what is security and risk management
what is information security risk management
information security risk management policy
managing risk in information systems