Information Technology Risk Management in Enterprise Environments: A Review of Industry Practices and a Practical Guide to Risk Management Teams
By Jake Kouns and Daniel Minoli
5/5
()
Currently unavailable
Currently unavailable
About this ebook
- Discusses all types of corporate risks and practical means of defending against them.
- Security is currently identified as a critical area of Information Technology management by a majority of government, commercial, and industrial organizations.
- Offers an effective risk management program, which is the most critical function of an information security program.
Jake Kouns
Jake Kouns has an MBA with a concentration in Information Security from James Madison University. He holds a number of certifications including CISSP, CISM, CISA and CGEIT. He is currently Director of Cyber Security and Technology Risks Underwriting for Markel Corporation, a specialty insurance company. He has presented at many well-known security conferences including RSA, CISO Executive Summit, EntNet IEEE GlobeCom, CanSecWest, and SyScan. He is the co-author of Information Technology Risk Management in Enterprise Environments, and has also been interviewed numerous times as an expert in the security industry. Jake is the co-founder, CEO, and CFO of the Open Security Foundation (OSF), a non-profit organisation that oversees the operations of the Open Source Vulnerbility Database (OSVDB.org) and DataLossDB.
Read more from Jake Kouns
The Chief Information Security Officer: Insights, tools and survival skills Rating: 1 out of 5 stars1/5The CISO Perspective: Understand the importance of the CISO in the cyber threat landscape Rating: 0 out of 5 stars0 ratings
Related to Information Technology Risk Management in Enterprise Environments
Related ebooks
Security for Small Computer Systems: A Practical Guide for Users Rating: 0 out of 5 stars0 ratingsComputers, Business, and Security: The New Role for Security Rating: 0 out of 5 stars0 ratingsUltimate Computer Security Survey Rating: 0 out of 5 stars0 ratingsDistributed Systems Security: Issues, Processes and Solutions Rating: 0 out of 5 stars0 ratingsComputer Security Rating: 0 out of 5 stars0 ratingsRisk Assessment for Asset Owners Rating: 4 out of 5 stars4/5Assurance Technologies Principles and Practices: A Product, Process, and System Safety Perspective Rating: 0 out of 5 stars0 ratingsGuidelines for Developing Quantitative Safety Risk Criteria Rating: 0 out of 5 stars0 ratingsSafe and Secure Cyber-Physical Systems and Internet-of-Things Systems Rating: 0 out of 5 stars0 ratingsCybersecurity Operations Handbook Rating: 5 out of 5 stars5/5Managing Risk and Reliability of Process Plants Rating: 5 out of 5 stars5/5Secure Computer and Network Systems: Modeling, Analysis and Design Rating: 0 out of 5 stars0 ratingsISO 27001 Controls – A guide to implementing and auditing Rating: 5 out of 5 stars5/5ISO27001/ISO27002:2013: A Pocket Guide Rating: 4 out of 5 stars4/5ISO27001 in a Windows Environment: The best practice implementation handbook for a Microsoft Windows environment Rating: 0 out of 5 stars0 ratingsComputer Security Rating: 0 out of 5 stars0 ratingsApplication Security in the ISO27001 Environment Rating: 0 out of 5 stars0 ratingsInformation Security Risk Management for ISO27001/ISO27002 Rating: 4 out of 5 stars4/5Risk Management Technology in Financial Services: Risk Control, Stress Testing, Models, and IT Systems and Structures Rating: 0 out of 5 stars0 ratingsPhysical Security for IT Rating: 5 out of 5 stars5/5Information Assurance: Managing Organizational IT Security Risks Rating: 5 out of 5 stars5/5Information Security Risk Management for ISO 27001/ISO 27002, third edition Rating: 4 out of 5 stars4/5Emerging Topics in Hardware Security Rating: 0 out of 5 stars0 ratingsImplementing Homeland Security for Enterprise IT Rating: 0 out of 5 stars0 ratingsSystem Safety for the 21st Century: The Updated and Revised Edition of System Safety 2000 Rating: 0 out of 5 stars0 ratingsISO 27001/ISO 27002: A guide to information security management systems Rating: 0 out of 5 stars0 ratingsReliability of Software Intensive Systems Rating: 0 out of 5 stars0 ratingsOffensive and Defensive Security: Concepts, Planning, Operations, and Management Rating: 0 out of 5 stars0 ratingsIntroduction to Multimedia Communications: Applications, Middleware, Networking Rating: 0 out of 5 stars0 ratings
Internet & Web For You
How to Disappear and Live Off the Grid: A CIA Insider's Guide Rating: 0 out of 5 stars0 ratingsCoding All-in-One For Dummies Rating: 4 out of 5 stars4/5Coding For Dummies Rating: 5 out of 5 stars5/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State Rating: 4 out of 5 stars4/5Get Rich or Lie Trying: Ambition and Deceit in the New Influencer Economy Rating: 0 out of 5 stars0 ratingsTor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Six Figure Blogging Blueprint Rating: 5 out of 5 stars5/5How To Make Money Blogging: How I Replaced My Day-Job With My Blog and How You Can Start A Blog Today Rating: 4 out of 5 stars4/5The Gothic Novel Collection Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Podcasting For Dummies Rating: 4 out of 5 stars4/5Grokking Algorithms: An illustrated guide for programmers and other curious people Rating: 4 out of 5 stars4/5The Logo Brainstorm Book: A Comprehensive Guide for Exploring Design Directions Rating: 4 out of 5 stars4/5The Beginner's Affiliate Marketing Blueprint Rating: 4 out of 5 stars4/5Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5The $1,000,000 Web Designer Guide: A Practical Guide for Wealth and Freedom as an Online Freelancer Rating: 5 out of 5 stars5/5Introduction to Internet Scams and Fraud: Credit Card Theft, Work-At-Home Scams and Lottery Scams Rating: 4 out of 5 stars4/5The Mega Box: The Ultimate Guide to the Best Free Resources on the Internet Rating: 4 out of 5 stars4/5Stop Asking Questions: How to Lead High-Impact Interviews and Learn Anything from Anyone Rating: 5 out of 5 stars5/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5The Digital Marketing Handbook: A Step-By-Step Guide to Creating Websites That Sell Rating: 5 out of 5 stars5/5Learn JavaScript in 24 Hours Rating: 3 out of 5 stars3/5How To Start A Profitable Authority Blog In Under One Hour Rating: 5 out of 5 stars5/5
Reviews for Information Technology Risk Management in Enterprise Environments
1 rating0 reviews