Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Title Copyright About ApressOpen Foreword Contents at a Glance Contents About the Author Preface Acknowledgments Chapter 1: Introduction
Protect to Enable Keeping the Company Legal: The Regulatory Flood The Rapid Proliferation of Information and Devices The Changing Threat Landscape A New Approach to Managing Risk
Chapter 2: The Misperception of Risk
The Subjectivity of Risk Perception How Employees Misperceive Risk How Security Professionals Misperceive Risk How Decision Makers Misperceive Risk How to Mitigate the Misperception of Risk Communication Is Essential
Chapter 3: Governance and Internal Partnerships
Information Risk Governance Finding the Right Governance Structure Intel’s Information Risk Governance Building Internal Partnerships Conclusion
Chapter 4: External Partnerships
The Value of External Partnerships External Partnerships: Types and Tiers Conclusion
Chapter 5: People Are the Perimeter
The Shifting Perimeter Examining the Risks Adjusting Behavior The Payoff Roundabouts and Stop Signs The Security Benefits of Personal Use Sealing the Gaps The IT Professional Insider Threats Finding the Balance
Chapter 6: Emerging Threats and Vulnerabilities
Structured Methods for Identifying Threat Trends Trends That Span the Threat Landscape Key Threat Activity Areas The Web As an Attack Surface Conclusion
Chapter 7: A New Security Architecture to Improve Business Agility
Business Trends and Architecture Requirements
IT Consumerization New Business Needs Cloud Computing Changing Threat Landscape Privacy and Regulatory Requirements
New Architecture
Trust Calculation Security Zones Balanced Controls Users and Data: The New Perimeters
Conclusion
Chapter 8: Looking to the Future
Internet of Things Compute Continuum Cloud Computing Business Intelligence and Big Data Business Benefits and Risks
New Security Capabilities Baseline Security Context-Aware Security
Conclusion: The Implications for CISOs
Chapter 9: The 21st Century CISO
Chief Information Risk Officer The Z-Shaped Individual Foundational Skills Becoming a Storyteller Fear Is Junk Food
Accentuating the Positive
Demonstrating the Reality of Risk The CISO’s Sixth Sense
Taking Action at the Speed of Trust
The CISO As a Leader
Learning from Other Business Leaders
Looking to the Future
Chapter 10: References Index
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion