Book description
Spectacular security failures continue to dominate the headlines despite huge increases in security budgets and ever-more draconian regulations. The 20/20 hindsight of audits is no longer an effective solution to security weaknesses, and the necessity for real-time strategic metrics has never been more critical. Information Security Management Metr
Table of contents
- Front cover
- Contents (1/2)
- Contents (2/2)
- Acknowledgments
- Introduction (1/2)
- Introduction (2/2)
- Chapter 1. Security Metrics Overview (1/3)
- Chapter 1. Security Metrics Overview (2/3)
- Chapter 1. Security Metrics Overview (3/3)
- Chapter 2. Security Metrics (1/2)
- Chapter 2. Security Metrics (2/2)
- Chapter 3. Current State of Security Metrics (1/7)
- Chapter 3. Current State of Security Metrics (2/7)
- Chapter 3. Current State of Security Metrics (3/7)
- Chapter 3. Current State of Security Metrics (4/7)
- Chapter 3. Current State of Security Metrics (5/7)
- Chapter 3. Current State of Security Metrics (6/7)
- Chapter 3. Current State of Security Metrics (7/7)
- Chapter 4. Metrics Developments (1/2)
- Chapter 4. Metrics Developments (2/2)
- Chapter 5. Relevance
- Chapter 6. The Metrics Imperative (1/2)
- Chapter 6. The Metrics Imperative (2/2)
- Chapter 7. Attributes of Good Metrics (1/2)
- Chapter 7. Attributes of Good Metrics (2/2)
- Chapter 8. Information Security Governance (1/2)
- Chapter 8. Information Security Governance (2/2)
- Chapter 9. Metrics Development-A Different Approach (1/2)
- Chapter 9. Metrics Development-A Different Approach (2/2)
- Chapter 10. Information Security Governance Metrics (1/2)
- Chapter 10. Information Security Governance Metrics (2/2)
- Chapter 11. Information Security Risk Management (1/2)
- Chapter 11. Information Security Risk Management (2/2)
- Chapter 12. Information Security Program Development Metrics
- Chapter 13. Information Security Management Metrics (1/6)
- Chapter 13. Information Security Management Metrics (2/6)
- Chapter 13. Information Security Management Metrics (3/6)
- Chapter 13. Information Security Management Metrics (4/6)
- Chapter 13. Information Security Management Metrics (5/6)
- Chapter 13. Information Security Management Metrics (6/6)
- Chapter 14. Incident Management and Response (1/2)
- Chapter 14. Incident Management and Response (2/2)
- Chapter 15. Conclusions
- Acronyms (1/2)
- Acronyms (2/2)
- Appendix A: Metrics Classifications1 (1/2)
- Appendix A: Metrics Classifications1 (2/2)
- Appendix B: Cultural Worldviews1
- Appendix C: The Competing Values Framework
- Appendix D: The Organization Culture Assessment Instrument (OCAI)
- Appendix E: SABSA Business Attribute Metrics (1/4)
- Appendix E: SABSA Business Attribute Metrics (2/4)
- Appendix E: SABSA Business Attribute Metrics (3/4)
- Appendix E: SABSA Business Attribute Metrics (4/4)
- Appendix F: Capability Maturity Model
- Appendix G: Probabilistic Risk Assessment (1/2)
- Appendix G: Probabilistic Risk Assessment (2/2)
- Index (1/3)
- Index (2/3)
- Index (3/3)
- Back cover
Product information
- Title: Information Security Management Metrics
- Author(s):
- Release date: March 2009
- Publisher(s): Auerbach Publications
- ISBN: 9781420052862
You might also like
book
Deciphering Data Architectures
Data fabric, data lakehouse, and data mesh have recently appeared as viable alternatives to the modern …
book
Practical Cloud Security
With their rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and …
book
Database Internals
When it comes to choosing, using, and maintaining a database, understanding its internals is essential. But …
book
The Staff Engineer's Path
For years, companies have rewarded their most effective engineers with management positions. But treating management as …