Talabis / Martin | Information Security Risk Assessment Toolkit | Buch | 978-1-59749-735-0 | sack.de

Buch, Englisch, 278 Seiten, Format (B × H): 195 mm x 238 mm, Gewicht: 621 g

Talabis / Martin

Information Security Risk Assessment Toolkit

Practical Assessments Through Data Collection and Data Analysis
Erscheinungsjahr 2012
ISBN: 978-1-59749-735-0
Verlag: Elsevier Science

Practical Assessments Through Data Collection and Data Analysis

Buch, Englisch, 278 Seiten, Format (B × H): 195 mm x 238 mm, Gewicht: 621 g

ISBN: 978-1-59749-735-0
Verlag: Elsevier Science


In order to protect company's information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments. Effective risk assessments are meant to provide a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. Information Security Risk Assessments gives you the tools and skills to get a quick, reliable, and thorough risk assessment for key stakeholders.

- Based on authors' experiences of real-world assessments, reports, and presentations

- Focuses on implementing a process, rather than theory, that allows you to derive a quick and valuable assessment

- Includes a companion web site with spreadsheets you can utilize to create and maintain the risk assessment

Talabis / Martin Information Security Risk Assessment Toolkit jetzt bestellen!

Zielgruppe


<p>Information Security Officers, IT Auditors, IT Professionals, Chief Information Officers, Privacy Officers, Risk Officers, IT Enterprise Architects</p>

Weitere Infos & Material


Chapter 1: Information Security Risk Assessments Chapter 2: A Practical Approach Chapter 3: Data Collection Chapter 4: Data Analysis Chapter 5: Risk Assessment Chapter 6: Risk Prioritization and Treatment Chapter 7: Reporting Chapter 8: Maintenance and Wrap Up


Martin, Jason
Jason Martin is the President and CEO of Secure DNA, an Information Security Company that provides security solutions to companies throughout the United States and Asia. Prior to joining Secure DNA he was a Manager within KPMG's Information Risk Management group. In his professional services role Mr. Martin has successfully designed, implemented, and operated security programs for multi-billion dollar organizations within Hawaii and the US Mainland as well as provided subject matter expertise as an executive level security advisor to companies throughout the world. He is a Certified Information Security Manager (CISM), a Certified Information Systems Security Professional (CISSP), a Certified Information Systems Auditor (CISA), Certified in the Governance of Enterprise IT (CGEIT), and holds the designation as Certified in Risk and Information Systems Control (CRISC). He has advised Lawmakers on emerging cyber security risks and is working with legislatures to enhance state privacy laws. He is a frequent speaker and instructor at security and audit training events and seminars, is a founder of the Shakacon Security Conference, and is on the board of advisors for the Hackito Ergo Sum security conference in France. He is a former board member for the Hawaii chapter of ISACA and is a current board member for the Hawaii chapter of INFRAGARD.

Talabis, Mark
Mark Ryan Talabis is a Manager for the Secure DNA Consulting practice. Prior to joining Secure DNA he was a consultant in the Asian Development Bank (ADB). He has extensive experience in information security risk assessments, information security policy and program development, vulnerability assessments and penetration testing and has specialized expertise in security analytics and data mining as applied to information security. He has a Master's degree in Information Technology; Certified Information Systems Security Professional (CISSP); Certified Information Systems Auditor (CISA); a GIAC Certified Incident Handler Certification (GCIH); a GIAC Security Essentials Certification (GSEC); Certified in Risk and Information Systems Control (CRISC); and a Microsoft Certified Professional (MCP) on SQL Server Administration;. He has presented in various security and academic conferences around the world including Blackhat and Defcon and has a number of published papers to his name in various peer-reviewed journals. He is an alumni member of the Honeynet Project and is currently taking a Master of Liberal Arts (ALM) in Extension Studies in Harvard University.

Mark Ryan Del Moral Talabis is a Senior Consultant within the Secure DNA Consulting practice. He has extensive experience in information security risk assessments, vulnerability assessments and penetration testing and has specialized expertise in security data analysis and incident response. Mark is a GIAC Certified Incident Handler Certification (GCIH); a GIAC Security Essentials Certification (GSEC); and a full member of the Honeynet Project.

Jason Martin is the co-Founder and President of Secure DNA Consulting and has over 12 years of Information Security experience. Prior to Secure DNA Consulting he was a manager in KPMG's Information Risk Management group providing Information Security and Risk Management consulting to KPMG clients throughout the U.S. In both his current and previous roles he has provided expert Information Security services to companies and executives all over the world and specializes in building, repairing, and operating Enterprise Information Security Programs. He has specialized experience in complex system security assessments, penetration testing/ethical hacking, and enterprise information security risk assessments. He is one of the founders of the Shakacon information security conference and holds certifications as a CISSP, CISA, CISM, and CGEIT.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.