Manager's guide to enterprise security risk management :: essentials of risk-based security.
Is security management changing so fast that you can't keep up? Perhaps it seems like those traditional "best practices" in security no longer work? One answer might be that you need better best practices! In their new book, The Manager's Guide to Enterprise Security Risk Managem...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rothstein Publishing,
2016.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Is security management changing so fast that you can't keep up? Perhaps it seems like those traditional "best practices" in security no longer work? One answer might be that you need better best practices! In their new book, The Manager's Guide to Enterprise Security Risk Management: Essentials of Risk-Based Security, two experienced professionals introduce ESRM. Their practical, organization-wide, integrated approach redefines the securing of an organization's people and assets from being task-based to being risk-based. In their careers, the authors, Brian Allen and Rachelle Loyear, have been |
Beschreibung: | 1 online resource (138) |
ISBN: | 1944480250 9781944480257 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn964358625 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr |n||||||||| | ||
008 | 161125s2016 xx o 000 0 eng d | ||
040 | |a IDEBK |b eng |e pn |c IDEBK |d EBLCP |d MERUC |d IDEBK |d IDB |d LGG |d OCLCQ |d N$T |d OCLCF |d OCLCQ |d K6U |d OCLCO |d OCLCQ |d OCLCO |d HOPLA | ||
020 | |a 1944480250 |q (ebk) | ||
020 | |a 9781944480257 |q (electronic bk.) | ||
020 | |z 1944480242 | ||
035 | |a (OCoLC)964358625 | ||
037 | |a 971440 |b MIL | ||
050 | 4 | |a HD61.5 | |
082 | 7 | |a 658.47 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Allen, Brian. | |
245 | 1 | 0 | |a Manager's guide to enterprise security risk management : |b essentials of risk-based security. |
260 | |b Rothstein Publishing, |c 2016. | ||
300 | |a 1 online resource (138) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
588 | 0 | |a Print version record. | |
505 | 0 | |a Cover; Title page; Copyright; Table of Contents; Part 1: What Is Enterprise Security Risk Management (ESRM) and How Can It Help You?; Chapter 1: What is Enterprise Security Risk Management (ESRM)?; 1.1 ESRM Defined; 1.1.1 Enterprise; 1.1.2 Security Risk; 1.1.3 Risk Principles; 1.2 How is ESRM Different from Traditional Security?The description; 1.2.1 Traditional Corporate Security Scenarios: Something is Missing; 1.3 What is ESRM? − A Closer Look; 1.3.1 The Phases of the ESRM Life Cycle; 1.3.2 Managing Risk in a Life Cycle; 1.4 What ESRM Is -- and What It Is Not; 1.4.1 ESRM Mission and Goals | |
505 | 8 | |a 1.4.1.1 Enterprise Risk Management: A Brief Overview 1.4.2 ESRM vs. Security Organization Convergence; Chapter 2: Why Does the Security Industry Need ESRM?; 2.1 Why Does the Traditional Approach to Security Frustrate So Many People?; 2.1.1 The Missing Network Switch: A Story of Security Frustration in a TraditionalSecurity Environment; 2.1.2 The Missing Network Switch: A Story of Security Partnership in an ESRMSecurity Environment; 2.1.3 The Missing Network Switch: Lessons Learned and the ESRM Difference; 2.2 What Do We Mean by "Traditional" Security vs. ESRM? | |
505 | 8 | |a 2.2.1 What Does Security Do? The Traditional View2.2.1.1 The Answer from the Security Practitioner; 2.2.1.2 The Answer from the Board of Directors and Senior Executives; 2.2.1.3 The Answer from Operational Personnel; 2.2.2 Why the Security Industry Needs to Define "Security"; 2.2.3 What Does Security Do? The ESRM View; 2.2.3.1 Managing Security Risks; 2.2.3.2 Basic Risk Principles; 2.3 The Security Professional and the Business Leader: Moving BeyondFrustration with One Another; 2.4 ESRM-Based Security: Moving from Task Management to Risk Management; 2.4.1 Task Management. | |
505 | 8 | |a 2.4.2 Risk Management2.5 The ESRM Solution: A New Philosophy; 2.5.1 Security Becomes Strategic; 2.5.2 Security Becomes a Business Function; 2.6 ESRM as a Path to Security Success; 2.6.1 What Does "Security Success" Look Like?; 2.6.1.1 Success Is Not Just Measured by Numbers; 2.6.1.2 In Security Success, Intangibles Are Important; 2.6.1.3 Your Answers Create Your Definition of "Success"; Part 2: Implementing an ESRM Program; Chapter 3: Preparing to Implement an ESRM Program; 3.1 Begin by Working to Understand the Business and Its Mission; 3.1.1 What Are the Insiders Saying? | |
505 | 8 | |a 3.1.2 What is the Business Saying About Itself?3.1.3 What Are Outsiders Saying?; 3.1.4 What Isn't Being Said?; 3.1.5 What Is the Environment the Enterprise Operates In?; 3.1.6 Who Are the Environmental Decision-Makers?; 3.2 Understanding Your Stakeholders − and Why They Matter; 3.2.1 What Is a Stakeholder?; 3.2.2 Why Should You Care About Stakeholders?; 3.2.3 What Is the Role of the Stakeholders in ESRM?; 3.2.4 Finding Your Stakeholders: A Closer Look; 3.2.5 Example 1: Customer Personal Data − Whose Asset Is It?; 3.2.6 Example 2: Customer Personal Data − Who Decides | |
520 | |a Is security management changing so fast that you can't keep up? Perhaps it seems like those traditional "best practices" in security no longer work? One answer might be that you need better best practices! In their new book, The Manager's Guide to Enterprise Security Risk Management: Essentials of Risk-Based Security, two experienced professionals introduce ESRM. Their practical, organization-wide, integrated approach redefines the securing of an organization's people and assets from being task-based to being risk-based. In their careers, the authors, Brian Allen and Rachelle Loyear, have been | ||
650 | 0 | |a Corporations |x Security measures. | |
650 | 0 | |a Computer security. |0 http://id.loc.gov/authorities/subjects/sh90001862 | |
650 | 0 | |a Corporate culture. |0 http://id.loc.gov/authorities/subjects/sh85032896 | |
650 | 6 | |a Sociétés |x Sécurité |x Mesures. | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Culture organisationnelle. | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Corporate culture |2 fast | |
650 | 7 | |a Corporations |x Security measures |2 fast | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1424618 |3 Volltext |
936 | |a BATCHLOAD | ||
938 | |a hoopla Digital |b HOPL |n MWT11825964 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL4745796 | ||
938 | |a EBSCOhost |b EBSC |n 1424618 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis36991322 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn964358625 |
---|---|
_version_ | 1816882370338357248 |
adam_text | |
any_adam_object | |
author | Allen, Brian |
author_facet | Allen, Brian |
author_role | |
author_sort | Allen, Brian |
author_variant | b a ba |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HD61 |
callnumber-raw | HD61.5 |
callnumber-search | HD61.5 |
callnumber-sort | HD 261.5 |
callnumber-subject | HD - Industries, Land Use, Labor |
collection | ZDB-4-EBA |
contents | Cover; Title page; Copyright; Table of Contents; Part 1: What Is Enterprise Security Risk Management (ESRM) and How Can It Help You?; Chapter 1: What is Enterprise Security Risk Management (ESRM)?; 1.1 ESRM Defined; 1.1.1 Enterprise; 1.1.2 Security Risk; 1.1.3 Risk Principles; 1.2 How is ESRM Different from Traditional Security?The description; 1.2.1 Traditional Corporate Security Scenarios: Something is Missing; 1.3 What is ESRM? − A Closer Look; 1.3.1 The Phases of the ESRM Life Cycle; 1.3.2 Managing Risk in a Life Cycle; 1.4 What ESRM Is -- and What It Is Not; 1.4.1 ESRM Mission and Goals 1.4.1.1 Enterprise Risk Management: A Brief Overview 1.4.2 ESRM vs. Security Organization Convergence; Chapter 2: Why Does the Security Industry Need ESRM?; 2.1 Why Does the Traditional Approach to Security Frustrate So Many People?; 2.1.1 The Missing Network Switch: A Story of Security Frustration in a TraditionalSecurity Environment; 2.1.2 The Missing Network Switch: A Story of Security Partnership in an ESRMSecurity Environment; 2.1.3 The Missing Network Switch: Lessons Learned and the ESRM Difference; 2.2 What Do We Mean by "Traditional" Security vs. ESRM? 2.2.1 What Does Security Do? The Traditional View2.2.1.1 The Answer from the Security Practitioner; 2.2.1.2 The Answer from the Board of Directors and Senior Executives; 2.2.1.3 The Answer from Operational Personnel; 2.2.2 Why the Security Industry Needs to Define "Security"; 2.2.3 What Does Security Do? The ESRM View; 2.2.3.1 Managing Security Risks; 2.2.3.2 Basic Risk Principles; 2.3 The Security Professional and the Business Leader: Moving BeyondFrustration with One Another; 2.4 ESRM-Based Security: Moving from Task Management to Risk Management; 2.4.1 Task Management. 2.4.2 Risk Management2.5 The ESRM Solution: A New Philosophy; 2.5.1 Security Becomes Strategic; 2.5.2 Security Becomes a Business Function; 2.6 ESRM as a Path to Security Success; 2.6.1 What Does "Security Success" Look Like?; 2.6.1.1 Success Is Not Just Measured by Numbers; 2.6.1.2 In Security Success, Intangibles Are Important; 2.6.1.3 Your Answers Create Your Definition of "Success"; Part 2: Implementing an ESRM Program; Chapter 3: Preparing to Implement an ESRM Program; 3.1 Begin by Working to Understand the Business and Its Mission; 3.1.1 What Are the Insiders Saying? 3.1.2 What is the Business Saying About Itself?3.1.3 What Are Outsiders Saying?; 3.1.4 What Isn't Being Said?; 3.1.5 What Is the Environment the Enterprise Operates In?; 3.1.6 Who Are the Environmental Decision-Makers?; 3.2 Understanding Your Stakeholders − and Why They Matter; 3.2.1 What Is a Stakeholder?; 3.2.2 Why Should You Care About Stakeholders?; 3.2.3 What Is the Role of the Stakeholders in ESRM?; 3.2.4 Finding Your Stakeholders: A Closer Look; 3.2.5 Example 1: Customer Personal Data − Whose Asset Is It?; 3.2.6 Example 2: Customer Personal Data − Who Decides |
ctrlnum | (OCoLC)964358625 |
dewey-full | 658.47 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.47 |
dewey-search | 658.47 |
dewey-sort | 3658.47 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05437cam a2200565 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn964358625</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |n|||||||||</controlfield><controlfield tag="008">161125s2016 xx o 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">IDEBK</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">IDEBK</subfield><subfield code="d">EBLCP</subfield><subfield code="d">MERUC</subfield><subfield code="d">IDEBK</subfield><subfield code="d">IDB</subfield><subfield code="d">LGG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">K6U</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">HOPLA</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1944480250</subfield><subfield code="q">(ebk)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781944480257</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1944480242</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)964358625</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">971440</subfield><subfield code="b">MIL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HD61.5</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">658.47</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Allen, Brian.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Manager's guide to enterprise security risk management :</subfield><subfield code="b">essentials of risk-based security.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="b">Rothstein Publishing,</subfield><subfield code="c">2016.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (138)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover; Title page; Copyright; Table of Contents; Part 1: What Is Enterprise Security Risk Management (ESRM) and How Can It Help You?; Chapter 1: What is Enterprise Security Risk Management (ESRM)?; 1.1 ESRM Defined; 1.1.1 Enterprise; 1.1.2 Security Risk; 1.1.3 Risk Principles; 1.2 How is ESRM Different from Traditional Security?The description; 1.2.1 Traditional Corporate Security Scenarios: Something is Missing; 1.3 What is ESRM? − A Closer Look; 1.3.1 The Phases of the ESRM Life Cycle; 1.3.2 Managing Risk in a Life Cycle; 1.4 What ESRM Is -- and What It Is Not; 1.4.1 ESRM Mission and Goals</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">1.4.1.1 Enterprise Risk Management: A Brief Overview 1.4.2 ESRM vs. Security Organization Convergence; Chapter 2: Why Does the Security Industry Need ESRM?; 2.1 Why Does the Traditional Approach to Security Frustrate So Many People?; 2.1.1 The Missing Network Switch: A Story of Security Frustration in a TraditionalSecurity Environment; 2.1.2 The Missing Network Switch: A Story of Security Partnership in an ESRMSecurity Environment; 2.1.3 The Missing Network Switch: Lessons Learned and the ESRM Difference; 2.2 What Do We Mean by "Traditional" Security vs. ESRM?</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">2.2.1 What Does Security Do? The Traditional View2.2.1.1 The Answer from the Security Practitioner; 2.2.1.2 The Answer from the Board of Directors and Senior Executives; 2.2.1.3 The Answer from Operational Personnel; 2.2.2 Why the Security Industry Needs to Define "Security"; 2.2.3 What Does Security Do? The ESRM View; 2.2.3.1 Managing Security Risks; 2.2.3.2 Basic Risk Principles; 2.3 The Security Professional and the Business Leader: Moving BeyondFrustration with One Another; 2.4 ESRM-Based Security: Moving from Task Management to Risk Management; 2.4.1 Task Management.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">2.4.2 Risk Management2.5 The ESRM Solution: A New Philosophy; 2.5.1 Security Becomes Strategic; 2.5.2 Security Becomes a Business Function; 2.6 ESRM as a Path to Security Success; 2.6.1 What Does "Security Success" Look Like?; 2.6.1.1 Success Is Not Just Measured by Numbers; 2.6.1.2 In Security Success, Intangibles Are Important; 2.6.1.3 Your Answers Create Your Definition of "Success"; Part 2: Implementing an ESRM Program; Chapter 3: Preparing to Implement an ESRM Program; 3.1 Begin by Working to Understand the Business and Its Mission; 3.1.1 What Are the Insiders Saying?</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">3.1.2 What is the Business Saying About Itself?3.1.3 What Are Outsiders Saying?; 3.1.4 What Isn't Being Said?; 3.1.5 What Is the Environment the Enterprise Operates In?; 3.1.6 Who Are the Environmental Decision-Makers?; 3.2 Understanding Your Stakeholders − and Why They Matter; 3.2.1 What Is a Stakeholder?; 3.2.2 Why Should You Care About Stakeholders?; 3.2.3 What Is the Role of the Stakeholders in ESRM?; 3.2.4 Finding Your Stakeholders: A Closer Look; 3.2.5 Example 1: Customer Personal Data − Whose Asset Is It?; 3.2.6 Example 2: Customer Personal Data − Who Decides</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Is security management changing so fast that you can't keep up? Perhaps it seems like those traditional "best practices" in security no longer work? One answer might be that you need better best practices! In their new book, The Manager's Guide to Enterprise Security Risk Management: Essentials of Risk-Based Security, two experienced professionals introduce ESRM. Their practical, organization-wide, integrated approach redefines the securing of an organization's people and assets from being task-based to being risk-based. In their careers, the authors, Brian Allen and Rachelle Loyear, have been</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Corporations</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh90001862</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Corporate culture.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85032896</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sociétés</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Culture organisationnelle.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Corporate culture</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Corporations</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1424618</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="936" ind1=" " ind2=" "><subfield code="a">BATCHLOAD</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">hoopla Digital</subfield><subfield code="b">HOPL</subfield><subfield code="n">MWT11825964</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL4745796</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1424618</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">cis36991322</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn964358625 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:27:32Z |
institution | BVB |
isbn | 1944480250 9781944480257 |
language | English |
oclc_num | 964358625 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (138) |
psigel | ZDB-4-EBA |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Rothstein Publishing, |
record_format | marc |
spelling | Allen, Brian. Manager's guide to enterprise security risk management : essentials of risk-based security. Rothstein Publishing, 2016. 1 online resource (138) text txt rdacontent computer c rdamedia online resource cr rdacarrier Print version record. Cover; Title page; Copyright; Table of Contents; Part 1: What Is Enterprise Security Risk Management (ESRM) and How Can It Help You?; Chapter 1: What is Enterprise Security Risk Management (ESRM)?; 1.1 ESRM Defined; 1.1.1 Enterprise; 1.1.2 Security Risk; 1.1.3 Risk Principles; 1.2 How is ESRM Different from Traditional Security?The description; 1.2.1 Traditional Corporate Security Scenarios: Something is Missing; 1.3 What is ESRM? − A Closer Look; 1.3.1 The Phases of the ESRM Life Cycle; 1.3.2 Managing Risk in a Life Cycle; 1.4 What ESRM Is -- and What It Is Not; 1.4.1 ESRM Mission and Goals 1.4.1.1 Enterprise Risk Management: A Brief Overview 1.4.2 ESRM vs. Security Organization Convergence; Chapter 2: Why Does the Security Industry Need ESRM?; 2.1 Why Does the Traditional Approach to Security Frustrate So Many People?; 2.1.1 The Missing Network Switch: A Story of Security Frustration in a TraditionalSecurity Environment; 2.1.2 The Missing Network Switch: A Story of Security Partnership in an ESRMSecurity Environment; 2.1.3 The Missing Network Switch: Lessons Learned and the ESRM Difference; 2.2 What Do We Mean by "Traditional" Security vs. ESRM? 2.2.1 What Does Security Do? The Traditional View2.2.1.1 The Answer from the Security Practitioner; 2.2.1.2 The Answer from the Board of Directors and Senior Executives; 2.2.1.3 The Answer from Operational Personnel; 2.2.2 Why the Security Industry Needs to Define "Security"; 2.2.3 What Does Security Do? The ESRM View; 2.2.3.1 Managing Security Risks; 2.2.3.2 Basic Risk Principles; 2.3 The Security Professional and the Business Leader: Moving BeyondFrustration with One Another; 2.4 ESRM-Based Security: Moving from Task Management to Risk Management; 2.4.1 Task Management. 2.4.2 Risk Management2.5 The ESRM Solution: A New Philosophy; 2.5.1 Security Becomes Strategic; 2.5.2 Security Becomes a Business Function; 2.6 ESRM as a Path to Security Success; 2.6.1 What Does "Security Success" Look Like?; 2.6.1.1 Success Is Not Just Measured by Numbers; 2.6.1.2 In Security Success, Intangibles Are Important; 2.6.1.3 Your Answers Create Your Definition of "Success"; Part 2: Implementing an ESRM Program; Chapter 3: Preparing to Implement an ESRM Program; 3.1 Begin by Working to Understand the Business and Its Mission; 3.1.1 What Are the Insiders Saying? 3.1.2 What is the Business Saying About Itself?3.1.3 What Are Outsiders Saying?; 3.1.4 What Isn't Being Said?; 3.1.5 What Is the Environment the Enterprise Operates In?; 3.1.6 Who Are the Environmental Decision-Makers?; 3.2 Understanding Your Stakeholders − and Why They Matter; 3.2.1 What Is a Stakeholder?; 3.2.2 Why Should You Care About Stakeholders?; 3.2.3 What Is the Role of the Stakeholders in ESRM?; 3.2.4 Finding Your Stakeholders: A Closer Look; 3.2.5 Example 1: Customer Personal Data − Whose Asset Is It?; 3.2.6 Example 2: Customer Personal Data − Who Decides Is security management changing so fast that you can't keep up? Perhaps it seems like those traditional "best practices" in security no longer work? One answer might be that you need better best practices! In their new book, The Manager's Guide to Enterprise Security Risk Management: Essentials of Risk-Based Security, two experienced professionals introduce ESRM. Their practical, organization-wide, integrated approach redefines the securing of an organization's people and assets from being task-based to being risk-based. In their careers, the authors, Brian Allen and Rachelle Loyear, have been Corporations Security measures. Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Corporate culture. http://id.loc.gov/authorities/subjects/sh85032896 Sociétés Sécurité Mesures. Sécurité informatique. Culture organisationnelle. Computer security fast Corporate culture fast Corporations Security measures fast FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1424618 Volltext |
spellingShingle | Allen, Brian Manager's guide to enterprise security risk management : essentials of risk-based security. Cover; Title page; Copyright; Table of Contents; Part 1: What Is Enterprise Security Risk Management (ESRM) and How Can It Help You?; Chapter 1: What is Enterprise Security Risk Management (ESRM)?; 1.1 ESRM Defined; 1.1.1 Enterprise; 1.1.2 Security Risk; 1.1.3 Risk Principles; 1.2 How is ESRM Different from Traditional Security?The description; 1.2.1 Traditional Corporate Security Scenarios: Something is Missing; 1.3 What is ESRM? − A Closer Look; 1.3.1 The Phases of the ESRM Life Cycle; 1.3.2 Managing Risk in a Life Cycle; 1.4 What ESRM Is -- and What It Is Not; 1.4.1 ESRM Mission and Goals 1.4.1.1 Enterprise Risk Management: A Brief Overview 1.4.2 ESRM vs. Security Organization Convergence; Chapter 2: Why Does the Security Industry Need ESRM?; 2.1 Why Does the Traditional Approach to Security Frustrate So Many People?; 2.1.1 The Missing Network Switch: A Story of Security Frustration in a TraditionalSecurity Environment; 2.1.2 The Missing Network Switch: A Story of Security Partnership in an ESRMSecurity Environment; 2.1.3 The Missing Network Switch: Lessons Learned and the ESRM Difference; 2.2 What Do We Mean by "Traditional" Security vs. ESRM? 2.2.1 What Does Security Do? The Traditional View2.2.1.1 The Answer from the Security Practitioner; 2.2.1.2 The Answer from the Board of Directors and Senior Executives; 2.2.1.3 The Answer from Operational Personnel; 2.2.2 Why the Security Industry Needs to Define "Security"; 2.2.3 What Does Security Do? The ESRM View; 2.2.3.1 Managing Security Risks; 2.2.3.2 Basic Risk Principles; 2.3 The Security Professional and the Business Leader: Moving BeyondFrustration with One Another; 2.4 ESRM-Based Security: Moving from Task Management to Risk Management; 2.4.1 Task Management. 2.4.2 Risk Management2.5 The ESRM Solution: A New Philosophy; 2.5.1 Security Becomes Strategic; 2.5.2 Security Becomes a Business Function; 2.6 ESRM as a Path to Security Success; 2.6.1 What Does "Security Success" Look Like?; 2.6.1.1 Success Is Not Just Measured by Numbers; 2.6.1.2 In Security Success, Intangibles Are Important; 2.6.1.3 Your Answers Create Your Definition of "Success"; Part 2: Implementing an ESRM Program; Chapter 3: Preparing to Implement an ESRM Program; 3.1 Begin by Working to Understand the Business and Its Mission; 3.1.1 What Are the Insiders Saying? 3.1.2 What is the Business Saying About Itself?3.1.3 What Are Outsiders Saying?; 3.1.4 What Isn't Being Said?; 3.1.5 What Is the Environment the Enterprise Operates In?; 3.1.6 Who Are the Environmental Decision-Makers?; 3.2 Understanding Your Stakeholders − and Why They Matter; 3.2.1 What Is a Stakeholder?; 3.2.2 Why Should You Care About Stakeholders?; 3.2.3 What Is the Role of the Stakeholders in ESRM?; 3.2.4 Finding Your Stakeholders: A Closer Look; 3.2.5 Example 1: Customer Personal Data − Whose Asset Is It?; 3.2.6 Example 2: Customer Personal Data − Who Decides Corporations Security measures. Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Corporate culture. http://id.loc.gov/authorities/subjects/sh85032896 Sociétés Sécurité Mesures. Sécurité informatique. Culture organisationnelle. Computer security fast Corporate culture fast Corporations Security measures fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh90001862 http://id.loc.gov/authorities/subjects/sh85032896 |
title | Manager's guide to enterprise security risk management : essentials of risk-based security. |
title_auth | Manager's guide to enterprise security risk management : essentials of risk-based security. |
title_exact_search | Manager's guide to enterprise security risk management : essentials of risk-based security. |
title_full | Manager's guide to enterprise security risk management : essentials of risk-based security. |
title_fullStr | Manager's guide to enterprise security risk management : essentials of risk-based security. |
title_full_unstemmed | Manager's guide to enterprise security risk management : essentials of risk-based security. |
title_short | Manager's guide to enterprise security risk management : |
title_sort | manager s guide to enterprise security risk management essentials of risk based security |
title_sub | essentials of risk-based security. |
topic | Corporations Security measures. Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Corporate culture. http://id.loc.gov/authorities/subjects/sh85032896 Sociétés Sécurité Mesures. Sécurité informatique. Culture organisationnelle. Computer security fast Corporate culture fast Corporations Security measures fast |
topic_facet | Corporations Security measures. Computer security. Corporate culture. Sociétés Sécurité Mesures. Sécurité informatique. Culture organisationnelle. Computer security Corporate culture Corporations Security measures |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1424618 |
work_keys_str_mv | AT allenbrian managersguidetoenterprisesecurityriskmanagementessentialsofriskbasedsecurity |