Information Security Management Metrics

Book description

Spectacular security failures continue to dominate the headlines despite huge increases in security budgets and ever-more draconian regulations. The 20/20 hindsight of audits is no longer an effective solution to security weaknesses, and the necessity for real-time strategic metrics has never been more critical. Information Security Management Metr

Table of contents

  1. Front cover
  2. Contents (1/2)
  3. Contents (2/2)
  4. Acknowledgments
  5. Introduction (1/2)
  6. Introduction (2/2)
  7. Chapter 1. Security Metrics Overview (1/3)
  8. Chapter 1. Security Metrics Overview (2/3)
  9. Chapter 1. Security Metrics Overview (3/3)
  10. Chapter 2. Security Metrics (1/2)
  11. Chapter 2. Security Metrics (2/2)
  12. Chapter 3. Current State of Security Metrics (1/7)
  13. Chapter 3. Current State of Security Metrics (2/7)
  14. Chapter 3. Current State of Security Metrics (3/7)
  15. Chapter 3. Current State of Security Metrics (4/7)
  16. Chapter 3. Current State of Security Metrics (5/7)
  17. Chapter 3. Current State of Security Metrics (6/7)
  18. Chapter 3. Current State of Security Metrics (7/7)
  19. Chapter 4. Metrics Developments (1/2)
  20. Chapter 4. Metrics Developments (2/2)
  21. Chapter 5. Relevance
  22. Chapter 6. The Metrics Imperative (1/2)
  23. Chapter 6. The Metrics Imperative (2/2)
  24. Chapter 7. Attributes of Good Metrics (1/2)
  25. Chapter 7. Attributes of Good Metrics (2/2)
  26. Chapter 8. Information Security Governance (1/2)
  27. Chapter 8. Information Security Governance (2/2)
  28. Chapter 9. Metrics Development-A Different Approach (1/2)
  29. Chapter 9. Metrics Development-A Different Approach (2/2)
  30. Chapter 10. Information Security Governance Metrics (1/2)
  31. Chapter 10. Information Security Governance Metrics (2/2)
  32. Chapter 11. Information Security Risk Management (1/2)
  33. Chapter 11. Information Security Risk Management (2/2)
  34. Chapter 12. Information Security Program Development Metrics
  35. Chapter 13. Information Security Management Metrics (1/6)
  36. Chapter 13. Information Security Management Metrics (2/6)
  37. Chapter 13. Information Security Management Metrics (3/6)
  38. Chapter 13. Information Security Management Metrics (4/6)
  39. Chapter 13. Information Security Management Metrics (5/6)
  40. Chapter 13. Information Security Management Metrics (6/6)
  41. Chapter 14. Incident Management and Response (1/2)
  42. Chapter 14. Incident Management and Response (2/2)
  43. Chapter 15. Conclusions
  44. Acronyms (1/2)
  45. Acronyms (2/2)
  46. Appendix A: Metrics Classifications1 (1/2)
  47. Appendix A: Metrics Classifications1 (2/2)
  48. Appendix B: Cultural Worldviews1
  49. Appendix C: The Competing Values Framework
  50. Appendix D: The Organization Culture Assessment Instrument (OCAI)
  51. Appendix E: SABSA Business Attribute Metrics (1/4)
  52. Appendix E: SABSA Business Attribute Metrics (2/4)
  53. Appendix E: SABSA Business Attribute Metrics (3/4)
  54. Appendix E: SABSA Business Attribute Metrics (4/4)
  55. Appendix F: Capability Maturity Model
  56. Appendix G: Probabilistic Risk Assessment (1/2)
  57. Appendix G: Probabilistic Risk Assessment (2/2)
  58. Index (1/3)
  59. Index (2/3)
  60. Index (3/3)
  61. Back cover

Product information

  • Title: Information Security Management Metrics
  • Author(s): Krag Brotby CISM
  • Release date: March 2009
  • Publisher(s): Auerbach Publications
  • ISBN: 9781420052862