Catálogo de publicaciones - libros

Compartir en
redes sociales


Título de Acceso Abierto

Managing Risk and Information Security: Managing Risk and Information Security

2nd ed..

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

Computer science

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No requiere 2016 Directory of Open access Books acceso abierto
No requiere 2016 SpringerLink acceso abierto

Información

Tipo de recurso:

libros

ISBN impreso

978-1-4842-1456-5

ISBN electrónico

978-1-4842-1455-8

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Tabla de contenidos

Introduction

Malcolm W. Harkins

There are two primary choices in life: to accept conditions as they exist, or accept the responsibility for changing them.

Pp. 1-16

The Misperception of Risk

Malcolm W. Harkins

The moment we want to believe something, we suddenly see all the arguments for it, and become blind to the arguments against it.

Pp. 17-29

Governance and Internal Partnerships: How to Sense, Interpret, and Act on Risk

Malcolm W. Harkins

To reduce cost, our company’s human resources group wants to move all HR-related processes to a SaaS provider, a cloud-based business that’s less than five years old. At first glance, this might seem a low-risk decision. There’s a clear business case, and outsourcing HR systems doesn’t seem to create risks to corporate information assets such as intellectual property. Most businesses regard HR systems as commodity applications, so they might select the supplier who can deliver the required functionality at the lowest cost.

Pp. 31-48

External Partnerships: The Power of Sharing Information

Malcolm W. Harkins

After spending a day at a conference, I was having dinner with a dozen or so peers when a debate began about the dangers and benefits of sharing security information with other companies. One person turned to me and asked me whether, if I had information about a specific new threat, I would share it with him.

Pp. 49-63

People Are the Perimeter

Malcolm W. Harkins

A few years ago, a senior manager began bringing his corporate laptop into the cafeteria at lunchtime. Typically, he’d find an empty table, set down the laptop, and then walk out of sight to get his lunch. As he perused the salads and main courses, made selections, and paid for his food, his laptop sat unattended in plain view of hundreds of people using the large cafeteria.

Pp. 65-80

Emerging Threats and Vulnerabilities: Reality and Rhetoric

Malcolm W. Harkins

These days it’s hard to read an online news source, pick up a newspaper, or watch TV without seeing reports of new threats: cybercrimes, data breaches, industrial espionage, and potential destruction of national infrastructure. These reports inevitably leave the impression that we are drowning in an inexorable tide of new and terrifying threats.

Pp. 81-98

A New Security Architecture to Improve Business Agility

Malcolm W. Harkins

An organization’s ability to learn, and translate that learning into action rapidly, is the ultimate competitive advantage.

Pp. 99-116

Looking to the Future: Emerging Security Capabilities

Malcolm W. Harkins

The Web has existed for two decades, yet it’s only in the last few years that we’ve gained a clearer picture of what the Internet may become, and how the emerging capabilities may shape the future.

Pp. 117-128

Corporate Social Responsibility: The Ethics of Managing Information Risk

Malcolm W. Harkins

In the past year or so, we have passed a major inflection point; it has become clear that almost every powered device will compute, communicate, and have an IP address.

Pp. 129-137

The 21st Century CISO

Malcolm W. Harkins

The finance director sounded frustrated and exhausted. Our IT auditors had been trying to tell her about an obscure yet important data backup problem that affected SOX compliance. But her background was in accounting, not technology, and as the IT experts presented page after page of technical information elaborating the intricacies of backup processes, her eyes glazed over. The more they tried to explain by adding yet another layer of detail, the more confused and frustrated she became.

Pp. 139-153