Cargando…

The Manager's Guide to Enterprise Security Risk Management : Essentials of Risk-Based Security.

Is security management changing so fast that you can't keep up? Perhaps it seems like those traditional "best practices" in security no longer work? One answer might be that you need better best practices! In their new book, The Manager's Guide to Enterprise Security Risk Managem...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Allen, Brian
Otros Autores: Loyear, Rachelle, Noakes-Fry, Kristen
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Brookfield : Rothstein Publishing, 2016.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBSCO_ocn964410838
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |n|---|||||
008 161126s2016 xx o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d MERUC  |d IDB  |d IDEBK  |d OCLCQ  |d UAB  |d OCLCO  |d K6U  |d OCLCQ  |d OCLCF  |d EBLCP  |d N$T  |d D6H  |d AGLDB  |d COO  |d OCLCQ  |d S9I  |d STF  |d OCLCQ  |d AJS  |d OCLCO  |d OCLCQ  |d OCLCO 
020 |a 9781944480240  |q (electronic bk.) 
020 |a 1944480242  |q (electronic bk.) 
035 |a (OCoLC)964410838 
050 4 |a HV6431  |b .A45 2016eb 
072 7 |a BUS  |x 082000  |2 bisacsh 
072 7 |a BUS  |x 041000  |2 bisacsh 
072 7 |a BUS  |x 042000  |2 bisacsh 
072 7 |a BUS  |x 085000  |2 bisacsh 
082 0 4 |a 658.15/5  |2 23 
049 |a UAMI 
100 1 |a Allen, Brian. 
245 1 4 |a The Manager's Guide to Enterprise Security Risk Management :  |b Essentials of Risk-Based Security. 
260 |a Brookfield :  |b Rothstein Publishing,  |c 2016. 
300 |a 1 online resource (166 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file 
588 0 |a Print version record. 
505 0 |a Title page; Copyright; Part 1; Chapter 1: What is Enterprise Security Risk Management (ESRM)?; 1.1 ESRM Defined; 1.1.1 Enterprise; 1.1.2 Security Risk; 1.1.3 Risk Principles; 1.2 How is ESRM Different from Traditional Security?; 1.2.1 Traditional Corporate Security Scenarios: Something is Missing; 1.3 What is ESRM? -- A Closer Look; 1.3.1 The Phases of the ESRM Life Cycle; 1.3.2 Managing Risk in a Life Cycle; 1.4 What ESRM Is -- and What It Is Not; 1.4.1 ESRM Mission and Goals; 1.4.1.1 Enterprise Risk Management: A Brief Overview; 1.4.2 ESRM vs. Security Organization Convergence. 
505 8 |a Chapter 2: Why Does the Security Industry Need ESRM?2.1 Why Does the Traditional Approach to Security Frustrate So Many People?; 2.1.1 The Missing Network Switch: A Story of Security Frustration in a Traditional Security Environment; 2.1.2 The Missing Network Switch: A Story of Security Partnership in an ESRM Security Environment; 2.1.3 The Missing Network Switch: Lessons Learned and the ESRM Difference; 2.2 What Do We Mean by "Traditional" Security vs. ESRM?; 2.2.1 What Does Security Do? The Traditional View; 2.2.1.1 The Answer from the Security Practitioner. 
505 8 |a 2.2.1.2 The Answer from the Board of Directors and Senior Executives2.2.1.3 The Answer from Operational Personnel; 2.2.2 Why the Security Industry Needs to Define "Security"; 2.2.3 What Does Security Do? The ESRM View; 2.2.3.1 Managing Security Risks; 2.2.3.2 Basic Risk Principles; 2.3 The Security Professional and the Business Leader: Moving Beyond Frustration with One Another; 2.4 ESRM-Based Security: Moving from Task Management to Risk Management; 2.4.1 Task Management; 2.4.2 Risk Management; 2.5 The ESRM Solution: A New Philosophy; 2.5.1 Security Becomes Strategic. 
505 8 |a 2.5.2 Security Becomes a Business Function2.6 ESRM as a Path to Security Success; 2.6.1 What Does "Security Success" Look Like?; 2.6.1.1 Success Is Not Just Measured by Numbers; 2.6.1.2 In Security Success, Intangibles Are Important; 2.6.1.3 Your Answers Create Your Definition of "Success"; Part 2; Chapter 3: Preparing to Implement an ESRM Program; 3.1 Begin by Working to Understand the Business and Its Mission; 3.1.1 What Are the Insiders Saying?; 3.1.2 What is the Business Saying About Itself?; 3.1.3 What Are Outsiders Saying?; 3.1.4 What Isn't Being Said? 
505 8 |a 3.1.5 What Is the Environment the Enterprise Operates In?3.1.6 Who Are the Environmental Decision-Makers?; 3.2 Understanding Your Stakeholders -- and Why They Matter; 3.2.1 What Is a Stakeholder?; 3.2.2 Why Should You Care About Stakeholders?; 3.2.3 What Is the Role of the Stakeholders in ESRM?; 3.2.4 Finding Your Stakeholders: A Closer Look; 3.2.5 Example 1: Customer Personal Data -- Whose Asset Is It?; 3.2.6 Example 2: Customer Personal Data -- Who Decides; Chapter 4: Following the ESRM Life Cycle; 4.1 What is the ESRM Life Cycle?; 4.2 Step 1: Identify and Prioritize Assets. 
500 |a 4.2.1 How Do You Identify Business Assets? 
520 |a Is security management changing so fast that you can't keep up? Perhaps it seems like those traditional "best practices" in security no longer work? One answer might be that you need better best practices! In their new book, The Manager's Guide to Enterprise Security Risk Management: Essentials of Risk-Based Security, two experienced professionals introduce ESRM. Their practical, organization-wide, integrated approach redefines the securing of an organization's people and assets from being task-based to being risk-based. In their careers, the authors, Brian Allen and Rachelle Loyear, have been 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Risk management. 
650 0 |a Risk assessment. 
650 6 |a Gestion du risque. 
650 6 |a Évaluation du risque. 
650 7 |a risk management.  |2 aat 
650 7 |a risk assessment.  |2 aat 
650 7 |a BUSINESS & ECONOMICS  |x Industrial Management.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Management.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Management Science.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Organizational Behavior.  |2 bisacsh 
650 7 |a Risk assessment  |2 fast 
650 7 |a Risk management  |2 fast 
700 1 |a Loyear, Rachelle. 
700 1 |a Noakes-Fry, Kristen. 
776 0 8 |i Print version:  |a Allen, Brian.  |t Manager's Guide to Enterprise Security Risk Management : Essentials of Risk-Based Security.  |d Brookfield : Rothstein Publishing, ©2016 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1424619  |z Texto completo 
936 |a BATCHLOAD 
938 |a EBL - Ebook Library  |b EBLB  |n EBL5220063 
938 |a EBL - Ebook Library  |b EBLB  |n EBL4746144 
938 |a EBSCOhost  |b EBSC  |n 1424619 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis36991322 
994 |a 92  |b IZTAP