In order to protect company’s information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments. Effective risk assessments are meant to provide a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. Information Security Risk Assessment Toolkit gives you the tools and skills to get a quick, reliable, and thorough risk assessment for key stakeholders.
"synopsis" may belong to another edition of this title.
Information Security Risk Assessment Toolkit gives you the tools and skills to complete a quick, reliable, and thorough risk assessment. This book helps to determine what assets need protection, what risks these assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. Following our approach will result in a risk assessment with defendable analysis of the potential risks associated with your key assets.
He is co-author of the book "Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data Analysis" from Syngress. He has presented in various security and academic conferences and organizations around the world including Blackhat, Defcon, Shakacon, INFORMS, INFRAGARD, ISSA, and ISACA. He has a number of published papers to his name in various peer-reviewed journals and is also an alumni member of the Honeynet Project.
He has a Master of Liberal Arts Degree (ALM) in Information Technology from Harvard University and a Master of Science (MS) degree in Information Technology from Ateneo de Manila University. He holds several certifications including a Certified Information Systems Security Professional (CISSP); Certified Information Systems Auditor (CISA); and Certified in Risk and Information Systems Control (CRISC).
Jason Martin is Vice President of Cloud Business for FireEye, Inc. the global leader in advanced threat detection technology. Prior to joining FireEye Jason was the President and CEO of Secure DNA (acquired by FireEye), a company that provided innovative security products and solutions to companies throughout Asia-Pacific and the US Mainland. Customers included Fortune 1000 companies, global government agencies, state and local governments, and private organizations of all sizes. Mr. Martin has over fifteen years of experience in Information Security, is a published author and speaker, and is the co-founder of the Shakacon Security Conference.
"About this title" may belong to another edition of this title.
Shipping:
US$ 4.30
Within U.S.A.
Book Description Condition: new. Seller Inventory # FrontCover1597497355
Book Description Soft Cover. Condition: new. Seller Inventory # 9781597497350
Book Description PAP. Condition: New. New Book. Shipped from UK. Established seller since 2000. Seller Inventory # GB-9781597497350
Book Description Paperback / softback. Condition: New. New copy - Usually dispatched within 4 working days. Provides a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. This title gives you the tools and skills to get a thorough risk assessment for key stakeholders. It focuses on implementing a process, rather than theory, that allows you to derive a quick and valuable assessment. Seller Inventory # B9781597497350
Book Description Condition: New. pp. 278 1st Edition. Seller Inventory # 2642965150
Book Description Paperback. Condition: Brand New. 1st edition. 278 pages. 9.25x7.50x0.75 inches. In Stock. Seller Inventory # __1597497355
Book Description Condition: New. In. Seller Inventory # ria9781597497350_new
Book Description Condition: New. pp. 278. Seller Inventory # 49817409
Book Description Condition: New. 2012. 1st Edition. Paperback. Provides a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. This title gives you the tools and skills to get a thorough risk assessment for key stakeholders. It focuses on implementing a process, rather than theory, that allows you to derive a quick and valuable assessment. Num Pages: 278 pages, Illustrated. BIC Classification: UR. Category: (P) Professional & Vocational. Dimension: 233 x 192 x 18. Weight in Grams: 616. Practical Assessments Through Data Collection and Data Analysis. 278 pages, Illustrated. Provides a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. This title gives you the tools and skills to get a thorough risk assessment for key stakeholders. It focuses on implementing a process, rather than theory, that allows you to derive a quick and valuable assessment. Cateogry: (P) Professional & Vocational. BIC Classification: UR. Dimension: 233 x 192 x 18. Weight: 584. . . . . . Seller Inventory # V9781597497350
Book Description Condition: new. Questo è un articolo print on demand. Seller Inventory # 28bc5234079db090fd5eb9b4de14ced3