𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement

✍ Scribed by W. Krag Brotby CISM


Publisher
Auerbach Publications, CRC Press
Year
2009
Tongue
English
Leaves
212
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Spectacular security failures continue to dominate the headlines despite huge increases in security budgets and ever-more draconian regulations. The 20/20 hindsight of audits is no longer an effective solution to security weaknesses, and the necessity for real-time strategic metrics has never been more critical.

Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement offers a radical new approach for developing and implementing security metrics essential for supporting business activities and managing information risk. This work provides anyone with security and risk management responsibilities insight into these critical security questions:

  • How secure is my organization?
  • How much security is enough?
  • What are the most cost-effective security solutions?
  • How secure is my organization?
  • You can’t manage what you can’t measure

    This volume shows readers how to develop metrics that can be used across an organization to assure its information systems are functioning, secure, and supportive of the organization’s business objectives. It provides a comprehensive overview of security metrics, discusses the current state of metrics in use today, and looks at promising new developments. Later chapters explore ways to develop effective strategic and management metrics for information security governance, risk management, program implementation and management, and incident management and response. Β 

    The book ensures that every facet of security required by an organization is linked to business objectives, and provides metrics to measure it. Case studies effectively demonstrate specific ways that metrics can be implemented across an enterprise to maximize business benefit.

    With three decades of enterprise information security experience, author Krag Brotby presents a workable approach to developing and managing cost-effective enterprise information security.


    πŸ“œ SIMILAR VOLUMES


    Quality Of Protection: Security Measurem
    ✍ Dieter Gollmann, Fabio Massacci, Artsiom Yautsiukhin πŸ“‚ Library πŸ“… 2006 🌐 English

    Quality of Protection: Security Measurements and Metrics is an edited volume based on the Quality of Protection Workshop in Milano, Italy (September 2005). This volume discusses how security research can progress towards quality of protection in security comparable to quality of service in networkin

    ISO/IEC 27004:2016, Information technolo
    ✍ ISO/IEC JTC 1/SC 27 πŸ“‚ Library πŸ“… 2016 πŸ› BSI 🌐 English

    BS ISO/IEC 27004 provides guidance on how to assess the performance of an Information Security Management System (ISMS) developed and implemented using BS ISO/IEC 27001. It explains how to develop and operate measurement processes, and how to assess and report the results of the associated measureme

    A Practical Guide to Managing Informatio
    ✍ Steve Purser πŸ“‚ Library πŸ“… 2004 πŸ› Artech Print on Demand 🌐 English

    This groundbreaking book helps you master the management of information security, concentrating on the proactive recognition and resolution of the practical issues of developing and implementing IT security for the enterprise. Drawing upon the authors' wealth of valuable experience in high-risk comm

    A Comprehensive Guide to Information Sec
    ✍ Rajkumar Banoth, Narsimha Gugulothu, Aruna Kranthi Godishala πŸ“‚ Library πŸ“… 2022 πŸ› CRC Press 🌐 English

    The text is written to provide readers with a comprehensive study of information security and management system, audit planning and preparation, audit techniques and collecting evidence, international information security (ISO) standard 27001, and asset management. It further discusses important top