Description

The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix something, but they can’t explain why. This book will help you to break free from the so-called "best practices" argument by articulating risk exposures in business terms. You will learn techniques for how to perform risk assessments for new IT projects, how to efficiently manage daily risk activities, and how to qualify the current risk level for presentation to executive level management. While other books focus entirely on risk analysis methods, this is the first comprehensive guide for managing security risks.

Key Features

  • Named a 2011 Best Governance and ISMS Book by InfoSec Reviews
  • Includes case studies to provide hands-on experience using risk assessment tools to calculate the costs and benefits of any security investment
  • Explores each phase of the risk management lifecycle, focusing on policies and assessment processes that should be used to properly assess and mitigate risk
  • Presents a roadmap for designing and implementing a security risk management program

Readership

CISOs, Security Managers, IT Managers, Security Consultants, IT Auditors, Security Analysts, and Students in Information Security/Assurance college programs

Table of Contents

Part I – Introduction to Risk Management
Chapter 1. The Security Evolution
Introduction
How We Got Here
A Risk Focused Future
Information Security Fundamentals
The Death of Information Security
Summary
References

Chapter 2. Risky Business
Introduction
Applying Risk Management to Information Security
Business Driven Security Program
Security as an Investment
Qualitative vs. Quantitative
Summary
References

Chapter 3. The Risk Management Lifecycle
Introduction
Stages of the Risk Management Lifecycle
Business Impact Assessment
A Vulnerability Assessment Is Not A Risk Assessment
Making Risk Decisions
Mitigation Planning & Long-term Strategy
Process Ownership
Summary

Part II – Risk Assessment and Analysis Techniques

Chapter 4. Risk Profiling
Introduction
How Risk Sensitivity is Measured
Asking the Right Questions
Assessing Risk Appetite
Summary
References

Chapter 5. Formulating a Risk
Introduction
Breaking Down a Risk
Who or What is the Threat?
Summary
References

Chapter 6. Risk Exposure Factors
Introduction
Qualitative Risk Measures
Summary
References

Chapter 7. Security Controls & Services
Introduction
Fundamental Security Services
Recommended Controls
Summary
References

Chapter 8. Risk Evaluation & Mitigation Strategies
Introduction
Risk Evaluation
Risk Mitigation Planning
Policy Exceptions and Risk Acceptance
Summary

Chapter 9. Reports & Consulting
Introduction
Risk Management Artifacts
A Consultant’s Perspective
Writing Audit Responses
Summary
References

Chapter 10. Risk Assessment Techniques
Introduction
Operational Assessments

Details

No. of pages:
360
Language:
English
Copyright:
© 2011
Published:
Imprint:
Syngress
Print ISBN:
9781597496155
Electronic ISBN:
9781597496162

About the author

Evan Wheeler

Evan Wheeler currently is a Director of Information Security for Omgeo (A DTCC | Thomson Reuters Company), an instructor at both Clark and Northeastern Universities, and the author of the Information Security Risk Management course for the SANS Institute. Previously he spent six years as a Security Consultant for the U.S. Department of Defense.

Affiliations and Expertise

currently is a Director of Information Security for Omgeo (A DTCC | Thomson Reuters Company), an instructor at both Clark and Northeastern Universities, and the author of the Information Security Risk Management course for the SANS Institute. Previously he spent six years as a Security Consultant for the U.S. Department of Defense.

Awards

Best Governance and ISMS Books 2011, InfoSec Reviews

Reviews

"Evan Wheeler has developed a much needed new approach to the field of security risk management. Readers familiar with this field of study will find that it does what he says he wants it to do: shake the old risk paradigms out of their roots and plant something fresh and useful today."--Dennis Treece, Colonel, US Army (Retired)/Chief Security Officer, Massachusetts Port Authority-Boston

"Wheeler’s book is predominantly a practitioner’s guide to security risk management but can also be used as a teaching text to help engineers, students of security, information assurance, or information systems more broadly. The key message that Wheeler is emphasizing is that risk is at the core of security, and at the heart of every business. Despite that the book lacks key referencing from academic literature, it can still be used as the basis for setting a large-scale team assignment on devising a risk management program from the ground up for a real organisation. Security professionals in banks will particularly find the book relevant."--Computers and Security

"This book is packed with practical
tips and the information contained throughout provides a good overview of the subject matter. The author explains the fundamentals of risk identification, assessment and management, exploring the differences between a vulnerability assessment and a risk assessment, and also providing rationales behind each of the subjects covered. This is not a technical book and the author generally avoids detailed technical analysis; rather it is an aide-memoir for Security Risk Management. …his book is recommended, in particular, for those beginning a career in Risk Management. It also provides a useful reference for current risk professionals who perhaps could benefit from a book that helps refine and further improve their current skillset."--Best Governance and ISMS Books in InfoSecReviews Book Awards

"