9781597496155-1597496154-Security Risk Management: Building an Information Security Risk Management Program from the Ground Up

Security Risk Management: Building an Information Security Risk Management Program from the Ground Up

ISBN-13: 9781597496155
ISBN-10: 1597496154
Edition: 1
Author: Evan Wheeler
Publication date: 2011
Publisher: Syngress
Format: Paperback 360 pages
FREE US shipping
Buy

From $14.99

Book details

ISBN-13: 9781597496155
ISBN-10: 1597496154
Edition: 1
Author: Evan Wheeler
Publication date: 2011
Publisher: Syngress
Format: Paperback 360 pages

Summary

Security Risk Management: Building an Information Security Risk Management Program from the Ground Up (ISBN-13: 9781597496155 and ISBN-10: 1597496154), written by authors Evan Wheeler, was published by Syngress in 2011. With an overall rating of 3.5 stars, it's a notable title among other Information Management (Processes & Infrastructure, Risk Management, Insurance, Security & Encryption, Management & Leadership) books. You can easily purchase or rent Security Risk Management: Building an Information Security Risk Management Program from the Ground Up (Paperback) from BooksRun, along with many other new and used Information Management books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $2.84.

Description

Security Risk Management is the definitive guide for building or running an information security risk management program. This book teaches practical techniques that will be used on a daily basis, while also explaining the fundamentals so students understand the rationale behind these practices. It explains how to perform risk assessments for new IT projects, how to efficiently manage daily risk activities, and how to qualify the current risk level for presentation to executive level management. While other books focus entirely on risk analysis methods, this is the first comprehensive text for managing security risks.

This book will help you to break free from the so-called best practices argument by articulating risk exposures in business terms. It includes case studies to provide hands-on experience using risk assessment tools to calculate the costs and benefits of any security investment. It explores each phase of the risk management lifecycle, focusing on policies and assessment processes that should be used to properly assess and mitigate risk. It also presents a roadmap for designing and implementing a security risk management program.

This book will be a valuable resource for CISOs, security managers, IT managers, security consultants, IT auditors, security analysts, and students enrolled in information security/assurance college programs.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book