Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Title
Copyright
About ApressOpen
Foreword
Contents at a Glance
Contents
About the Author
Preface
Acknowledgments
Chapter 1: Introduction
Protect to Enable
Keeping the Company Legal: The Regulatory Flood
The Rapid Proliferation of Information and Devices
The Changing Threat Landscape
A New Approach to Managing Risk
Chapter 2: The Misperception of Risk
The Subjectivity of Risk Perception
How Employees Misperceive Risk
How Security Professionals Misperceive Risk
How Decision Makers Misperceive Risk
How to Mitigate the Misperception of Risk
Communication Is Essential
Chapter 3: Governance and Internal Partnerships
Information Risk Governance
Finding the Right Governance Structure
Intel’s Information Risk Governance
Building Internal Partnerships
Conclusion
Chapter 4: External Partnerships
The Value of External Partnerships
External Partnerships: Types and Tiers
Conclusion
Chapter 5: People Are the Perimeter
The Shifting Perimeter
Examining the Risks
Adjusting Behavior
The Payoff
Roundabouts and Stop Signs
The Security Benefits of Personal Use
Sealing the Gaps
The IT Professional
Insider Threats
Finding the Balance
Chapter 6: Emerging Threats and Vulnerabilities
Structured Methods for Identifying Threat Trends
Trends That Span the Threat Landscape
Key Threat Activity Areas
The Web As an Attack Surface
Conclusion
Chapter 7: A New Security Architecture to Improve Business Agility
Business Trends and Architecture Requirements
IT Consumerization
New Business Needs
Cloud Computing
Changing Threat Landscape
Privacy and Regulatory Requirements
New Architecture
Trust Calculation
Security Zones
Balanced Controls
Users and Data: The New Perimeters
Conclusion
Chapter 8: Looking to the Future
Internet of Things
Compute Continuum
Cloud Computing
Business Intelligence and Big Data
Business Benefits and Risks
New Security Capabilities
Baseline Security
Context-Aware Security
Conclusion: The Implications for CISOs
Chapter 9: The 21st Century CISO
Chief Information Risk Officer
The Z-Shaped Individual
Foundational Skills
Becoming a Storyteller
Fear Is Junk Food
Accentuating the Positive
Demonstrating the Reality of Risk
The CISO’s Sixth Sense
Taking Action at the Speed of Trust
The CISO As a Leader
Learning from Other Business Leaders
Looking to the Future
Chapter 10: References
Index
← Prev
Back
Next →
← Prev
Back
Next →