Rabu, 29 Juni 2011

[D857.Ebook] PDF Ebook Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement, by W. Krag Brotby CISM

PDF Ebook Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement, by W. Krag Brotby CISM

This letter could not affect you to be smarter, yet the book Information Security Management Metrics: A Definitive Guide To Effective Security Monitoring And Measurement, By W. Krag Brotby CISM that we offer will stimulate you to be smarter. Yeah, at the very least you'll understand more than others that don't. This is what called as the high quality life improvisation. Why must this Information Security Management Metrics: A Definitive Guide To Effective Security Monitoring And Measurement, By W. Krag Brotby CISM It's because this is your preferred theme to check out. If you such as this Information Security Management Metrics: A Definitive Guide To Effective Security Monitoring And Measurement, By W. Krag Brotby CISM style around, why do not you check out guide Information Security Management Metrics: A Definitive Guide To Effective Security Monitoring And Measurement, By W. Krag Brotby CISM to enrich your conversation?

Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement, by W. Krag Brotby CISM

Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement, by W. Krag Brotby CISM



Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement, by W. Krag Brotby CISM

PDF Ebook Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement, by W. Krag Brotby CISM

Information Security Management Metrics: A Definitive Guide To Effective Security Monitoring And Measurement, By W. Krag Brotby CISM. It is the moment to boost and also revitalize your skill, understanding as well as experience included some enjoyment for you after very long time with monotone things. Operating in the workplace, going to examine, learning from exam and also more tasks could be completed and you have to begin new things. If you feel so tired, why do not you try new thing? A very simple thing? Checking out Information Security Management Metrics: A Definitive Guide To Effective Security Monitoring And Measurement, By W. Krag Brotby CISM is exactly what we offer to you will know. And guide with the title Information Security Management Metrics: A Definitive Guide To Effective Security Monitoring And Measurement, By W. Krag Brotby CISM is the referral currently.

It can be among your early morning readings Information Security Management Metrics: A Definitive Guide To Effective Security Monitoring And Measurement, By W. Krag Brotby CISM This is a soft file book that can be survived downloading and install from on the internet book. As understood, in this advanced age, innovation will alleviate you in doing some activities. Also it is simply reading the presence of publication soft file of Information Security Management Metrics: A Definitive Guide To Effective Security Monitoring And Measurement, By W. Krag Brotby CISM can be additional attribute to open. It is not just to open up and also save in the device. This moment in the early morning and also other leisure time are to check out the book Information Security Management Metrics: A Definitive Guide To Effective Security Monitoring And Measurement, By W. Krag Brotby CISM

The book Information Security Management Metrics: A Definitive Guide To Effective Security Monitoring And Measurement, By W. Krag Brotby CISM will still provide you positive worth if you do it well. Completing guide Information Security Management Metrics: A Definitive Guide To Effective Security Monitoring And Measurement, By W. Krag Brotby CISM to check out will certainly not become the only goal. The objective is by getting the good value from the book up until completion of guide. This is why; you have to learn even more while reading this Information Security Management Metrics: A Definitive Guide To Effective Security Monitoring And Measurement, By W. Krag Brotby CISM This is not only exactly how quick you check out a publication and also not only has the number of you finished the books; it is about what you have actually acquired from guides.

Considering the book Information Security Management Metrics: A Definitive Guide To Effective Security Monitoring And Measurement, By W. Krag Brotby CISM to check out is likewise needed. You could select the book based on the preferred motifs that you like. It will engage you to love checking out various other books Information Security Management Metrics: A Definitive Guide To Effective Security Monitoring And Measurement, By W. Krag Brotby CISM It can be also concerning the need that obliges you to check out guide. As this Information Security Management Metrics: A Definitive Guide To Effective Security Monitoring And Measurement, By W. Krag Brotby CISM, you can discover it as your reading book, also your favourite reading publication. So, find your favourite book right here and also obtain the connect to download and install guide soft documents.

Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement, by W. Krag Brotby CISM

Spectacular security failures continue to dominate the headlines despite huge increases in security budgets and ever-more draconian regulations. The 20/20 hindsight of audits is no longer an effective solution to security weaknesses, and the necessity for real-time strategic metrics has never been more critical.

Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement offers a radical new approach for developing and implementing security metrics essential for supporting business activities and managing information risk. This work provides anyone with security and risk management responsibilities insight into these critical security questions:


  • How secure is my organization?

  • How much security is enough?

  • What are the most cost-effective security solutions?

  • How secure is my organization?

  • You can’t manage what you can’t measure

    This volume shows readers how to develop metrics that can be used across an organization to assure its information systems are functioning, secure, and supportive of the organization’s business objectives. It provides a comprehensive overview of security metrics, discusses the current state of metrics in use today, and looks at promising new developments. Later chapters explore ways to develop effective strategic and management metrics for information security governance, risk management, program implementation and management, and incident management and response.  

    The book ensures that every facet of security required by an organization is linked to business objectives, and provides metrics to measure it. Case studies effectively demonstrate specific ways that metrics can be implemented across an enterprise to maximize business benefit.

    With three decades of enterprise information security experience, author Krag Brotby presents a workable approach to developing and managing cost-effective enterprise information security.

    • Sales Rank: #1548035 in eBooks
    • Published on: 2009-03-30
    • Released on: 2009-03-30
    • Format: Kindle eBook

    About the Author
    Enterprise Security Architect, Thousand Oaks, California,

    Most helpful customer reviews

    5 of 7 people found the following review helpful.
    Conceptual framework for a tough topic
    By Dr. G. Hinson
    Measuring information security is the greatest remaining challenge for many of us. Metrics are essential for a scientific management approach, rather than relying purely on gut feel and guesswork. Standards such as ISO/IEC 27001 require the use of objective information about the status and effectiveness of information security controls in relation to the risks, in order to drive appropriate improvements in the Information Security Management System. However, it is not immediately obvious exactly what needs measuring, nor how to do it. This book lays out the foundations on which a rational measurement system can be designed to manage information security in a more objective fashion.

    The author encourages readers to consider a wide variety of measurement approaches and apply them sensibly to their information security management issues. In addition to conventional information security metrics, the book draws on governance, risk management, financial management and business analysis methods, a more diverse range of approaches than is normally covered in this field. Introducing measures of organization structure and culture sets this security metrics book apart from most others.

    Although the writing style is clear, this is a complex subject covered in depth. Being rather theoretical in approach, the book won't suit practitioners simply looking for a short checklist of `security things to measure'. However, those with the interest and time to study Information Security Management Metrics will be rewarded with a deeper and more rounded understanding of the issue. As such, the book is probably of most value to CISOs and ISMs tasked with implementing better security metrics, and to information security management students.

    1 of 2 people found the following review helpful.
    Think twice before buying
    By Koala
    As one reviewer noted, the coverage is very superficial. The book included some rather obscure models that I have never seen it used in the real world. Perhaps the book is simply mis-titled. For the practitioners in the field who read the book and start digging a little deeper, you'd get the sense that the author really didn't have much hands-on experience. One particular paragraph and chart caught my eye.

    Page. 68, the paragraph and chart on a study of the ROSI of various activities, based on a whitepaper from @Stake. The author provided no interpretation for the chart. The book claims it's based on an analysis of over 600 organisations. And wrote an insightful observation, "These results will undoubtedly be controversial and lead to energetic protests..." The following was what trouble me.

    Here is a short version of what the "saving to cost ratio" chart suggests: (1)Screen Locking has a 71.9% effectiveness in improving security; whereas things like (2) Nightly Back-up (only 0.2%) and (3) Central Access Control (0.1%). Firewall, IDS, patches...etc are in between (all below 10%)

    Any security professional who saw the chart and read the "insight" would question the findings and probably dig a bit deeper. I did. As it turns out, through a thin connection of mine who knows a guy who knows another guy who used to work for @Stake.

    They couldn't find any whitepaper on a ROSI study of 600+ organisations. (Doesn't mean it's not there, but he couldn't find it.)

    The cited source of the chart did worked for @Stake for a year or so. However, the chart actually came from the source's PhD thesis while he was an economic graduate at Stanford University. (I am actually reading his paper from my desktop as I type this) I am just going to copy the following verbatim, straight from the PhD thesis... in reference to the "saving to cost ratio" chart,

    "The savings were calculated by assuming that each safeguard was implemented in isolation."

    So.... how many of you implemented screen saver locking "in isolation" ? or turn on your nightly backup "only" and nothing else as a security measure ? Don't get me wrong, it was actually quite an interesting paper, well worth the read. I believe the paper actually got quite a bit of press coverage when it was first released.

    The only thing "controversial" about this is How did the author miss that ? (book author, not the original source)

    Two stars for the end of chapters References.

    1 of 2 people found the following review helpful.
    High level collection of what's out in wild
    By VPS
    At the most, you can say that it's a good collection of what's out and about. Too much focus on few quantitative measures, and too little on 'Security metrics'.

    By no means it can be called "a definitive guide ...." It neither provides any ideas on 'monitoring' nor on real 'measurement metrics.'

    The index available as free download is misleading. It appears to cover a lot of ground and led me to purchase. However, if Goggling those topics or Wiki on any of those topics will provide more information than the narrative.

    I found the "Contents index" more useful than the book itself.

    See all 3 customer reviews...

    Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement, by W. Krag Brotby CISM PDF
    Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement, by W. Krag Brotby CISM EPub
    Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement, by W. Krag Brotby CISM Doc
    Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement, by W. Krag Brotby CISM iBooks
    Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement, by W. Krag Brotby CISM rtf
    Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement, by W. Krag Brotby CISM Mobipocket
    Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement, by W. Krag Brotby CISM Kindle

    [D857.Ebook] PDF Ebook Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement, by W. Krag Brotby CISM Doc

    [D857.Ebook] PDF Ebook Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement, by W. Krag Brotby CISM Doc

    [D857.Ebook] PDF Ebook Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement, by W. Krag Brotby CISM Doc
    [D857.Ebook] PDF Ebook Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement, by W. Krag Brotby CISM Doc

    Tidak ada komentar:

    Posting Komentar