How to Measure Anything in Cybersecurity Risk

How to Measure Anything in Cybersecurity Risk
Author: Douglas W. Hubbard,Richard Seiersen
Release: 2016-07-25
Editor: John Wiley & Sons
Pages: 304
ISBN: 9781119085294
Language: en
Available for:

DESCRIPTION BOOK:

A ground shaking exposé on the failure of popular cyber risk management methods How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current "risk management" practices, and offers a series of improvement techniques that help you fill the holes and ramp up security. In his bestselling book How to Measure Anything, author Douglas W. Hubbard opened the business world's eyes to the critical need for better measurement. This book expands upon that premise and draws from The Failure of Risk Management to sound the alarm in the cybersecurity realm. Some of the field's premier risk management approaches actually create more risk than they mitigate, and questionable methods have been duplicated across industries and embedded in the products accepted as gospel. This book sheds light on these blatant risks, and provides alternate techniques that can help improve your current situation. You'll also learn which approaches are too risky to save, and are actually more damaging than a total lack of any security. Dangerous risk management methods abound; there is no industry more critically in need of solutions than cybersecurity. This book provides solutions where they exist, and advises when to change tracks entirely. Discover the shortcomings of cybersecurity's "best practices" Learn which risk management approaches actually create risk Improve your current practices with practical alterations Learn which methods are beyond saving, and worse than doing nothing Insightful and enlightening, this book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection, so finding cracks in the vault is a positive thing—as long as you get there before the bad guys do. How to Measure Anything in Cybersecurity Risk is your guide to more robust protection through better quantitative processes, approaches, and techniques.

How to Measure Anything in Cybersecurity Risk

How to Measure Anything in Cybersecurity Risk
Author: Douglas W. Hubbard,Richard Seiersen
Release: 2016-07-25
Editor: John Wiley & Sons
Pages: 304
ISBN: 9781119224617
Language: en
Available for:

DESCRIPTION BOOK:

A ground shaking exposé on the failure of popular cyber risk management methods How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current "risk management" practices, and offers a series of improvement techniques that help you fill the holes and ramp up security. In his bestselling book How to Measure Anything, author Douglas W. Hubbard opened the business world's eyes to the critical need for better measurement. This book expands upon that premise and draws from The Failure of Risk Management to sound the alarm in the cybersecurity realm. Some of the field's premier risk management approaches actually create more risk than they mitigate, and questionable methods have been duplicated across industries and embedded in the products accepted as gospel. This book sheds light on these blatant risks, and provides alternate techniques that can help improve your current situation. You'll also learn which approaches are too risky to save, and are actually more damaging than a total lack of any security. Dangerous risk management methods abound; there is no industry more critically in need of solutions than cybersecurity. This book provides solutions where they exist, and advises when to change tracks entirely. Discover the shortcomings of cybersecurity's "best practices" Learn which risk management approaches actually create risk Improve your current practices with practical alterations Learn which methods are beyond saving, and worse than doing nothing Insightful and enlightening, this book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection, so finding cracks in the vault is a positive thing—as long as you get there before the bad guys do. How to Measure Anything in Cybersecurity Risk is your guide to more robust protection through better quantitative processes, approaches, and techniques.

How to Measure Anything

How to Measure Anything
Author: Douglas W. Hubbard
Release: 2010-03-25
Editor: Wiley
Pages: 320
ISBN: 9780470625675
Language: en
Available for:

DESCRIPTION BOOK:

Now updated with new research and even more intuitive explanations, a demystifying explanation of how managers can inform themselves to make less risky, more profitable business decisions This insightful and eloquent book will show you how to measure those things in your own business that, until now, you may have considered "immeasurable," including customer satisfaction, organizational flexibility, technology risk, and technology ROI. Adds even more intuitive explanations of powerful measurement methods and shows how they can be applied to areas such as risk management and customer satisfaction Continues to boldly assert that any perception of "immeasurability" is based on certain popular misconceptions about measurement and measurement methods Shows the common reasoning for calling something immeasurable, and sets out to correct those ideas Offers practical methods for measuring a variety of "intangibles" Adds recent research, especially in regards to methods that seem like measurement, but are in fact a kind of "placebo effect" for management – and explains how to tell effective methods from management mythology Written by recognized expert Douglas Hubbard-creator of Applied Information Economics-How to Measure Anything, Second Edition illustrates how the author has used his approach across various industries and how any problem, no matter how difficult, ill defined, or uncertain can lend itself to measurement using proven methods.

The Failure of Risk Management

The Failure of Risk Management
Author: Douglas W. Hubbard
Release: 2009-04-27
Editor: John Wiley & Sons
Pages: 304
ISBN: 9780470387955
Language: en
Available for:

DESCRIPTION BOOK:

An essential guide to the calibrated risk analysis approach The Failure of Risk Management takes a close look at misused and misapplied basic analysis methods and shows how some of the most popular "risk management" methods are no better than astrology! Using examples from the 2008 credit crisis, natural disasters, outsourcing to China, engineering disasters, and more, Hubbard reveals critical flaws in risk management methods–and shows how all of these problems can be fixed. The solutions involve combinations of scientifically proven and frequently used methods from nuclear power, exploratory oil, and other areas of business and government. Finally, Hubbard explains how new forms of collaboration across all industries and government can improve risk management in every field. Douglas W. Hubbard (Glen Ellyn, IL) is the inventor of Applied Information Economics (AIE) and the author of Wiley's How to Measure Anything: Finding the Value of Intangibles in Business (978-0-470-11012-6), the #1 bestseller in business math on Amazon. He has applied innovative risk assessment and risk management methods in government and corporations since 1994. "Doug Hubbard, a recognized expert among experts in the field of risk management, covers the entire spectrum of risk management in this invaluable guide. There are specific value-added take aways in each chapter that are sure to enrich all readers including IT, business management, students, and academics alike" —Peter Julian, former chief-information officer of the New York Metro Transit Authority. President of Alliance Group consulting "In his trademark style, Doug asks the tough questions on risk management. A must-read not only for analysts, but also for the executive who is making critical business decisions." —Jim Franklin, VP Enterprise Performance Management and General Manager, Crystal Ball Global Business Unit, Oracle Corporation.

How to Measure Anything Workbook

How to Measure Anything Workbook
Author: Douglas W. Hubbard
Release: 2014-03-17
Editor: John Wiley & Sons
Pages: 165
ISBN: 9781118752364
Language: en
Available for:

DESCRIPTION BOOK:

The invaluable companion to the new edition of the bestselling How to Measure Anything This companion workbook to the new edition of the insightful and eloquent How to Measure Anything walks readers through sample problems and exercises in which they can master and apply the methods discussed in the book. The book explains practical methods for measuring a variety of intangibles, including approaches to measuring customer satisfaction, organizational flexibility, technology risk, technology ROI, and other problems in business, government, and not-for-profits. Companion to the revision of the bestselling How to Measure Anything Provides chapter-by-chapter exercises Written by industry leader Douglas Hubbard Written by recognized expert Douglas Hubbard—creator of Applied Information Economics—How to Measure Anything Workbook illustrates how the author has used his approach across various industries and how any problem, no matter how difficult, ill defined, or uncertain can lend itself to measurement using proven methods.

Measuring and Managing Information Risk

Measuring and Managing Information Risk
Author: Jack Freund,Jack Jones
Release: 2014-08-23
Editor: Butterworth-Heinemann
Pages: 408
ISBN: 9780127999326
Language: en
Available for:

DESCRIPTION BOOK:

Using the factor analysis of information risk (FAIR) methodology developed over ten years and adopted by corporations worldwide, Measuring and Managing Information Risk provides a proven and credible framework for understanding, measuring, and analyzing information risk of any size or complexity. Intended for organizations that need to either build a risk management program from the ground up or strengthen an existing one, this book provides a unique and fresh perspective on how to do a basic quantitative risk analysis. Covering such key areas as risk theory, risk calculation, scenario modeling, and communicating risk within the organization, Measuring and Managing Information Risk helps managers make better business decisions by understanding their organizational risk. Uses factor analysis of information risk (FAIR) as a methodology for measuring and managing risk in any organization. Carefully balances theory with practical applicability and relevant stories of successful implementation. Includes examples from a wide variety of businesses and situations presented in an accessible writing style.

Pulse

Pulse
Author: Douglas W. Hubbard
Release: 2011-04-06
Editor: John Wiley & Sons
Pages: 210
ISBN: 1118063783
Language: en
Available for:

DESCRIPTION BOOK:

The ultimate guide to mining the Internet for real-time assessment of trends and data Showing how the Internet can be an incredible tool for businesses and others to measure trends in real time, Pulse describes tools for inexpensive and real time measurement methodologies businesses can start using right away. This timely book also puts this emerging science in perspective and explains how this new measurement instrument will profoundly change decision making in business and government. Shows how the Internet can be used as an incredibly powerful measurement tool Reveals how to mine the Internet to measure and forecast business progress Written by leading expert in business analytics and performance management Pulse reveals how the Internet is evolving into a tool for measuring and forecasting trends in society, the economy, public opinion and even public health and security. It is an absolutely essential book for every business leader to turn a powerful, underutilized tool to its complete potential.

Security Metrics

Security Metrics
Author: Andrew Jaquith
Release: 2007-03-26
Editor: Pearson Education
Pages: 376
ISBN: 9780132715775
Language: en
Available for:

DESCRIPTION BOOK:

The Definitive Guide to Quantifying, Classifying, and Measuring Enterprise IT Security Operations Security Metrics is the first comprehensive best-practice guide to defining, creating, and utilizing security metrics in the enterprise. Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization’s unique requirements. You’ll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. Security Metrics successfully bridges management’s quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith’s extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. You’ll learn how to: • Replace nonstop crisis response with a systematic approach to security improvement • Understand the differences between “good” and “bad” metrics • Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk • Quantify the effectiveness of security acquisition, implementation, and other program activities • Organize, aggregate, and analyze your data to bring out key insights • Use visualization to understand and communicate security issues more clearly • Capture valuable data from firewalls and antivirus logs, third-party auditor reports, and other resources • Implement balanced scorecards that present compact, holistic views of organizational security effectiveness

A Hacker I Am

A Hacker  I Am
Author: Craig Ford
Release: 2019-09-07
Editor: Lulu.com
Pages: 190
ISBN: 9780648693925
Language: en
Available for:

DESCRIPTION BOOK:

This book is not your normal cybersecurity book, it's not meant to be read from front to back chapter by chapter, you open it up and pick which chapter piques your interest the most and read that one first. Then choose your next one and read that and continue the process until you have finally read all of them. You may have enjoyed them enough to go back and read your favourites again or you may prefer the last two fantasy chapters at the end of the book.These were created to introduce you to the future hacker fantasy series that is currently being written and give you my readers a bit of a fun finish to "A Hacker, I Am". By all means though if you want to stick to the old fashioned method of reading a book, knock yourself out and read it from the front to the back, hey you bought the book you should be able to read it however you want too.This book is a collation of previous work, rewritten and adapted for this book. I have then written a lot of new content just for the book, including those fantasy book teasers which I hope you all enjoy. The book as you would have probably guessed it by now is all about Cyber Security but it's not written to be overly technical, it's written so that it can be understood by anyone who wants to learn more about how to better protect themselves.It covers many topics in cybersecurity including IoT, autonomous cars, hackers and many more that I have an opinion on. This book will be great at helping introduce individuals to the area and help them get a better understanding of what to look out for, what problems we are all going to face in the future but also have a bit of fun while we are at it. Or if you are already in the industry then it will be still an entertaining read that can help give you a different perspective on a few things.

Cybersecurity Risk Management

Cybersecurity Risk Management
Author: Cynthia Brumfield
Release: 2021-12-09
Editor: John Wiley & Sons
Pages: 180
ISBN: 9781119816287
Language: en
Available for:

DESCRIPTION BOOK:

Cybersecurity Risk Management In Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework, veteran technology analyst Cynthia Brumfield, with contributions from cybersecurity expert Brian Haugli, delivers a straightforward and up-to-date exploration of the fundamentals of cybersecurity risk planning and management. The book offers readers easy-to-understand overviews of cybersecurity risk management principles, user, and network infrastructure planning, as well as the tools and techniques for detecting cyberattacks. The book also provides a roadmap to the development of a continuity of operations plan in the event of a cyberattack. With incisive insights into the Framework for Improving Cybersecurity of Critical Infrastructure produced by the United States National Institute of Standards and Technology (NIST), Cybersecurity Risk Management presents the gold standard in practical guidance for the implementation of risk management best practices. Filled with clear and easy-to-follow advice, this book also offers readers: A concise introduction to the principles of cybersecurity risk management and the steps necessary to manage digital risk to systems, assets, data, and capabilities A valuable exploration of modern tools that can improve an organization’s network infrastructure protection A practical discussion of the challenges involved in detecting and responding to a cyberattack and the importance of continuous security monitoring A helpful examination of the recovery from cybersecurity incidents Perfect for undergraduate and graduate students studying cybersecurity, Cybersecurity Risk Management is also an ideal resource for IT professionals working in private sector and government organizations worldwide who are considering implementing, or who may be required to implement, the NIST Framework at their organization.

Confronting Cyber Risk

Confronting Cyber Risk
Author: Gregory J. Falco,Eric Rosenbach
Release: 2022
Editor: Oxford University Press
Pages: 225
ISBN: 9780197526545
Language: en
Available for:

DESCRIPTION BOOK:

"Confronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity is a practical leadership handbook defining a new strategy for improving cybersecurity and mitigating cyber risk. Written by two leading experts with extensive professional experience in cybersecurity, the book provides CEOs and cyber newcomers alike with novel, concrete guidance on how to implement a cutting-edge strategy to mitigate an organization's overall risk to malicious cyberattacks. Using short, real-world case studies, the book highlights the need to address attack prevention and the resilience of each digital asset while also accounting for an incident's potential impact on overall operations. In a world of hackers, artificial intelligence, and persistent ransomware attacks, the Embedded Endurance strategy embraces the reality of interdependent digital assets and provides an approach that addresses cyber risk at both the micro- (people, networks, systems and data) and macro-(organizational) levels. Most books about cybersecurity focus entirely on technology; the Embedded Endurance strategy recognizes the need for sophisticated thinking with preventative and resilience measures engaged systematically a cross your organization"--

Cyber Risk Management

Cyber Risk Management
Author: Christopher Hodson
Release: 2019
Editor: Kogan Page
Pages: 416
ISBN: 0749484128
Language: en
Available for:

DESCRIPTION BOOK:

Learn how to prioritize threats, implement a cyber security programme and effectively communicate risks

Data Driven Security

Data Driven Security
Author: Jay Jacobs,Bob Rudis
Release: 2014-01-24
Editor: John Wiley & Sons
Pages: 352
ISBN: 9781118793824
Language: en
Available for:

DESCRIPTION BOOK:

Uncover hidden patterns of data and respond withcountermeasures Security professionals need all the tools at their disposal toincrease their visibility in order to prevent security breaches andattacks. This careful guide explores two of the most powerful data analysis and visualization. You'll soon understand how toharness and wield data, from collection and storage to managementand analysis as well as visualization and presentation. Using ahands-on approach with real-world examples, this book shows you howto gather feedback, measure the effectiveness of your securitymethods, and make better decisions. Everything in this book will have practical application forinformation security professionals. Helps IT and security professionals understand and use data, sothey can thwart attacks and understand and visualizevulnerabilities in their networks Includes more than a dozen real-world examples and hands-onexercises that demonstrate how to analyze security data andintelligence and translate that information into visualizationsthat make plain how to prevent attacks Covers topics such as how to acquire and prepare security data,use simple statistical methods to detect malware, predict roguebehavior, correlate security events, and more Written by a team of well-known experts in the field ofsecurity and data analysis Lock down your networks, prevent hacks, and thwart malware byimproving visibility into the environment, all through the power ofdata and Security Using Data Analysis, Visualization, andDashboards.

IT Security Metrics A Practical Framework for Measuring Security Protecting Data

IT Security Metrics  A Practical Framework for Measuring Security   Protecting Data
Author: Lance Hayden
Release: 2010-08-22
Editor: McGraw Hill Professional
Pages: 396
ISBN: 9780071713412
Language: en
Available for:

DESCRIPTION BOOK:

Implement an Effective Security Metrics Project or Program IT Security Metrics provides a comprehensive approach to measuring risks, threats, operational activities, and the effectiveness of data protection in your organization. The book explains how to choose and design effective measurement strategies and addresses the data requirements of those strategies. The Security Process Management Framework is introduced and analytical strategies for security metrics data are discussed. You'll learn how to take a security metrics program and adapt it to a variety of organizational contexts to achieve continuous security improvement over time. Real-world examples of security measurement projects are included in this definitive guide. Define security metrics as a manageable amount of usable data Design effective security metrics Understand quantitative and qualitative data, data sources, and collection and normalization methods Implement a programmable approach to security using the Security Process Management Framework Analyze security metrics data using quantitative and qualitative methods Design a security measurement project for operational analysis of security metrics Measure security operations, compliance, cost and value, and people, organizations, and culture Manage groups of security measurement projects using the Security Improvement Program Apply organizational learning methods to security metrics

Cyber Threat

Cyber Threat
Author: MacDonnell Ulsch
Release: 2014-07-14
Editor: John Wiley & Sons
Pages: 224
ISBN: 9781118935958
Language: en
Available for:

DESCRIPTION BOOK:

Conquering cyber attacks requires a multi-sector, multi-modal approach Cyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks facing all facets of government and industry, and the various factors that must align to maintain information integrity. Written by one of the nation's most highly respected cyber risk analysts, the book describes how businesses and government agencies must protect their most valuable assets to avoid potentially catastrophic consequences. Much more than just cyber security, the necessary solutions require government and industry to work cooperatively and intelligently. This resource reveals the extent of the problem, and provides a plan to change course and better manage and protect critical information. Recent news surrounding cyber hacking operations show how intellectual property theft is now a matter of national security, as well as economic and commercial security. Consequences are far-reaching, and can have enormous effects on national economies and international relations. Aggressive cyber forces in China, Russia, Eastern Europe and elsewhere, the rise of global organized criminal networks, and inattention to vulnerabilities throughout critical infrastructures converge to represent an abundantly clear threat. Managing the threat and keeping information safe is now a top priority for global businesses and government agencies. Cyber Threat! breaks the issue down into real terms, and proposes an approach to effective defense. Topics include: The information at risk The true extent of the threat The potential consequences across sectors The multifaceted approach to defense The growing cyber threat is fundamentally changing the nation's economic, diplomatic, military, and intelligence operations, and will extend into future technological, scientific, and geopolitical influence. The only effective solution will be expansive and complex, encompassing every facet of government and industry. Cyber Threat! details the situation at hand, and provides the information that can help keep the nation safe.

The Cyber Risk Handbook

The Cyber Risk Handbook
Author: Domenic Antonucci
Release: 2017-05-01
Editor: John Wiley & Sons
Pages: 442
ISBN: 9781119308805
Language: en
Available for:

DESCRIPTION BOOK:

Actionable guidance and expert perspective for real-world cybersecurity The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world situations, and cross-functional solutions for enterprise-wide improvement. Beginning with an overview of counter-cyber evolution, the discussion quickly turns practical with design and implementation guidance for the range of capabilities expected of a robust cyber risk management system that is integrated with the enterprise risk management (ERM) system. Expert contributors from around the globe weigh in on specialized topics with tools and techniques to help any type or size of organization create a robust system tailored to its needs. Chapter summaries of required capabilities are aggregated to provide a new cyber risk maturity model used to benchmark capabilities and to road-map gap-improvement. Cyber risk is a fast-growing enterprise risk, not just an IT risk. Yet seldom is guidance provided as to what this means. This book is the first to tackle in detail those enterprise-wide capabilities expected by Board, CEO and Internal Audit, of the diverse executive management functions that need to team up with the Information Security function in order to provide integrated solutions. Learn how cyber risk management can be integrated to better protect your enterprise Design and benchmark new and improved practical counter-cyber capabilities Examine planning and implementation approaches, models, methods, and more Adopt a new cyber risk maturity model tailored to your enterprise needs The need to manage cyber risk across the enterprise—inclusive of the IT operations—is a growing concern as massive data breaches make the news on an alarmingly frequent basis. With a cyber risk management system now a business-necessary requirement, practitioners need to assess the effectiveness of their current system, and measure its gap-improvement over time in response to a dynamic and fast-moving threat landscape. The Cyber Risk Handbook brings the world's best thinking to bear on aligning that system to the enterprise and vice-a-versa. Every functional head of any organization must have a copy at-hand to understand their role in achieving that alignment.

Risk Centric Threat Modeling

Risk Centric Threat Modeling
Author: Tony UcedaVelez,Marco M. Morana
Release: 2015-05-26
Editor: John Wiley & Sons
Pages: 692
ISBN: 9780470500965
Language: en
Available for:

DESCRIPTION BOOK:

This book introduces the Process for Attack Simulation & Threat Analysis (PASTA) threat modeling methodology. It provides an introduction to various types of application threat modeling and introduces a risk-centric methodology aimed at applying security countermeasures that are commensurate to the possible impact that could be sustained from defined threat models, vulnerabilities, weaknesses, and attack patterns. This book describes how to apply application threat modeling as an advanced preventive form of security. The authors discuss the methodologies, tools, and case studies of successful application threat modeling techniques. Chapter 1 provides an overview of threat modeling, while Chapter 2 describes the objectives and benefits of threat modeling. Chapter 3 focuses on existing threat modeling approaches, and Chapter 4 discusses integrating threat modeling within the different types of Software Development Lifecycles (SDLCs). Threat modeling and risk management is the focus of Chapter 5. Chapter 6 and Chapter 7 examine Process for Attack Simulation and Threat Analysis (PASTA). Finally, Chapter 8 shows how to use the PASTA risk-centric threat modeling process to analyze the risks of specific threat agents targeting web applications. This chapter focuses specifically on the web application assets that include customer’s confidential data and business critical functionality that the web application provides. • Provides a detailed walkthrough of the PASTA methodology alongside software development activities, normally conducted via a standard SDLC process • Offers precise steps to take when combating threats to businesses • Examines real-life data breach incidents and lessons for risk management Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis is a resource for software developers, architects, technical risk managers, and seasoned security professionals.

The Complete Guide to Cybersecurity Risks and Controls

The Complete Guide to Cybersecurity Risks and Controls
Author: Anne Kohnke,Dan Shoemaker,Ken E. Sigler
Release: 2016-03-30
Editor: CRC Press
Pages: 326
ISBN: 9781498740579
Language: en
Available for:

DESCRIPTION BOOK:

The Complete Guide to Cybersecurity Risks and Controls presents the fundamental concepts of information and communication technology (ICT) governance and control. In this book, you will learn how to create a working, practical control structure that will ensure the ongoing, day-to-day trustworthiness of ICT systems and data. The book explains how to establish systematic control functions and timely reporting procedures within a standard organizational framework and how to build auditable trust into the routine assurance of ICT operations. The book is based on the belief that ICT operation is a strategic governance issue rather than a technical concern. With the exponential growth of security breaches and the increasing dependency on external business partners to achieve organizational success, the effective use of ICT governance and enterprise-wide frameworks to guide the implementation of integrated security controls are critical in order to mitigate data theft. Surprisingly, many organizations do not have formal processes or policies to protect their assets from internal or external threats. The ICT governance and control process establishes a complete and correct set of managerial and technical control behaviors that ensures reliable monitoring and control of ICT operations. The body of knowledge for doing that is explained in this text. This body of knowledge process applies to all operational aspects of ICT responsibilities ranging from upper management policy making and planning, all the way down to basic technology operation.

Transformational Security Awareness

Transformational Security Awareness
Author: Perry Carpenter
Release: 2019-05-21
Editor: John Wiley & Sons
Pages: 368
ISBN: 9781119566342
Language: en
Available for:

DESCRIPTION BOOK:

Expert guidance on the art and science of driving secure behaviors Transformational Security Awareness empowers security leaders with the information and resources they need to assemble and deliver effective world-class security awareness programs that drive secure behaviors and culture change. When all other processes, controls, and technologies fail, humans are your last line of defense. But, how can you prepare them? Frustrated with ineffective training paradigms, most security leaders know that there must be a better way. A way that engages users, shapes behaviors, and fosters an organizational culture that encourages and reinforces security-related values. The good news is that there is hope. That’s what Transformational Security Awareness is all about. Author Perry Carpenter weaves together insights and best practices from experts in communication, persuasion, psychology, behavioral economics, organizational culture management, employee engagement, and storytelling to create a multidisciplinary masterpiece that transcends traditional security education and sets you on the path to make a lasting impact in your organization. Find out what you need to know about marketing, communication, behavior science, and culture management Overcome the knowledge-intention-behavior gap Optimize your program to work with the realities of human nature Use simulations, games, surveys, and leverage new trends like escape rooms to teach security awareness Put effective training together into a well-crafted campaign with ambassadors Understand the keys to sustained success and ongoing culture change Measure your success and establish continuous improvements Do you care more about what your employees know or what they do? It's time to transform the way we think about security awareness. If your organization is stuck in a security awareness rut, using the same ineffective strategies, materials, and information that might check a compliance box but still leaves your organization wide open to phishing, social engineering, and security-related employee mistakes and oversights, then you NEED this book.

Crafting the InfoSec Playbook

Crafting the InfoSec Playbook
Author: Jeff Bollinger,Brandon Enright,Matthew Valites
Release: 2015-05-07
Editor: "O'Reilly Media, Inc."
Pages: 276
ISBN: 9781491913604
Language: en
Available for:

DESCRIPTION BOOK:

Any good attacker will tell you that expensive security monitoring and prevention tools aren’t enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You’ll learn how to develop your own threat intelligence and incident detection strategy, rather than depend on security tools alone. Written by members of Cisco’s Computer Security Incident Response Team, this book shows IT and information security professionals how to create an InfoSec playbook by developing strategy, technique, and architecture. Learn incident response fundamentals—and the importance of getting back to basics Understand threats you face and what you should be protecting Collect, mine, organize, and analyze as many relevant data sources as possible Build your own playbook of repeatable methods for security monitoring and response Learn how to put your plan into action and keep it running smoothly Select the right monitoring and detection tools for your environment Develop queries to help you sort through data and create valuable reports Know what actions to take during the incident response phase