Information Security Management Metrics : A Definitive Guide to Effective Security Monitoring and Measurement
Spectacular security failures continue to dominate the headlines despite huge increases in security budgets and ever-more draconian regulations
Business mathematics & systems, Data encryption Extended Catalogue - TAKES 1-2 WEEKS FOR DELIVERY
Spectacular security failures continue to dominate the headlines despite huge increases in security budgets and ever-more draconian regulations.
The 20/20 hindsight of audits is no longer an effective solution to security weaknesses, and the necessity for real-time strategic metrics has never been more critical. Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement offers a radical new approach for developing and implementing security metrics essential for supporting business activities and managing information risk.
This work provides anyone with security and risk management responsibilities insight into these critical security questions: How secure is my organization?How much security is enough?What are the most cost-effective security solutions?How secure is my organization?You can't manage what you can't measure This volume shows readers how to develop metrics that can be used across an organization to assure its information systems are functioning, secure, and supportive of the organization's business objectives.
It provides a comprehensive overview of security metrics, discusses the current state of metrics in use today, and looks at promising new developments. Later chapters explore ways to develop effective strategic and management metrics for information security governance, risk management, program implementation and management, and incident management and response.
The book ensures that every facet of security required by an organization is linked to business objectives, and provides metrics to measure it. Case studies effectively demonstrate specific ways that metrics can be implemented across an enterprise to maximize business benefit.
With three decades of enterprise information security experience, author Krag Brotby presents a workable approach to developing and managing cost-effective enterprise information security.
|Author||W.Krag CISM Brotby|
|Publication date||5 Aug 2008|