Managing Risk and Information Security: Protect to Enable et plus d'un million d'autres livres sont disponibles pour le Kindle d'Amazon. En savoir plus
  • Tous les prix incluent la TVA.
En stock.
Expédié et vendu par Amazon.
Emballage cadeau disponible.
Quantité :1
Managing Risk and Informa... a été ajouté à votre Panier
+ EUR 2,99 (livraison)
D'occasion: Bon | Détails
Vendu par Deal FR
État: D'occasion: Bon
Commentaire: Ce livre a été lu mais il est toujours en bon état. 100% garanti.
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir les 2 images

Managing Risk and Information Security: Protect to Enable (Anglais) Broché – 17 décembre 2012


Voir les 2 formats et éditions Masquer les autres formats et éditions
Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
Broché
"Veuillez réessayer"
EUR 31,60
EUR 29,12 EUR 26,68

Descriptions du produit

Biographie de l'auteur

Malcolm W. Harkins is vice president of the Information Technology Group, and Chief Information Security Officer (CISO) and general manager of Information Risk and Security at Intel. The group is responsible for managing the risk, controls, privacy, security, and other related compliance activities for all of Intel's information assets. Before becoming Intel's first CISO, Harkins held roles in Finance, Procurement and Operations. He has managed IT benchmarking efforts and Sarbanes Oxley systems compliance efforts. Before moving into IT, Harkins acted as the profit and loss manager for the Flash Product Group at Intel; was the general manager of Enterprise Capabilities, responsible for the delivery and support of Intel's Finance and HR systems; and worked in an Intel business venture focusing on e-commerce hosting. Harkins previously taught at the CIO institute at the UCLA Anderson School of Business and was an adjunct faculty member at Susquehanna University in 2009. In 2010, he received the excellence in the field of security award at the RSA conference. He was also recently recognized by Computerworld magazine as one of the top 100 Information Technology Leaders for 2012. Harkins received his bachelor's degree in economics from the University of California at Irvine and an MBA in finance and accounting from the University of California at Davis.


Détails sur le produit


En savoir plus sur l'auteur

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles

Commentaires client les plus utiles sur Amazon.com (beta)

Amazon.com: 26 commentaires
4 internautes sur 4 ont trouvé ce commentaire utile 
Great book to use to start the information security journey 20 mars 2013
Par Ben Rothke - Publié sur Amazon.com
Format: Broché
Risk management in the real world is not an easy endeavor. On one side, people use toilet seat covers thinking they do something, on the other side, millions of people smoke cigarettes, ignoring the empirical evidence of their danger.

In Managing Risk and Information Security: Protect to Enable, author Malcolm Harkins deals with the inherent tension of information security - that between limitations and enablement.

Harkins, in his role as CISO at Intel, argues that a new and fresh approach to information security is called for and he outlines it in the book.

At under 150 pages, the book provides a good introduction and high-level overview of the fundamentals of information security risk and details numerous risk management strategies.

One of the books key points is that information security often has a disconnect to the underlying business needs that it is expect to secure. Harkins accurately notes that the only way to create an effective risk mitigation strategy is to ensure that the business and technical groups communicate.

As to Harkins new approach to managing risk; he writes that given the increasing role of technology and the resulting information-related business risk, a new approach to information security built on the concept of protecting to enable is needed. Because compromise is inevitable, managing risk and surviving compromise are the key elements of this strategy.

Harkins writes that this new approach should:

* incorporate privacy and regulatory compliance by design, to encompass the full scope of business risk
* recognize that people and information--not the enterprise network boundary--are the security perimeter
* be dynamic and flexible enough to quickly adapt to new technologies and threats

Harkins writes that we need to accomplish a shift in thinking, adjusting our primary focus to enable the business, and then thinking creatively about how we can do so while managing the risk.

Not only is this a good book, it is part of the Apress Open format and is available for free. Amazon also offers it as a free Kindle download.

The book doesn't propose a single definitive solution, as Harkins notes that information is a journey without a finish line. For those looking to commence on that journey, Managing Risk and Information Security: Protect to Enable is a great place to start.
6 internautes sur 7 ont trouvé ce commentaire utile 
If you are one of the select few with no knowledge of technology and a desire to learn about network security, this is the book 3 juillet 2014
Par Andrew - Publié sur Amazon.com
Format: Format Kindle Achat vérifié
If you are thinking of reading this book, allow me to save you the trouble. Security must balance between protection and freedom of access. People like smart phones and social networking. People take better care of and are more productive with their own devices. Build information networks both within your organization and in others. The future will bring more challenges. Be optimistic. The cloud. The end. If you are hoping to learn anything technical you'll have to look elsewhere. This author does a masterful job of restating the obvious in as many ways possible. If there was a kindergarten curriculum for network security this would be the text book.
3 internautes sur 3 ont trouvé ce commentaire utile 
Quick read 2 avril 2013
Par Teddy Tsai - Publié sur Amazon.com
Format: Format Kindle
A quick flip through, lots of interesting insights and appropriate metaphors. A good communicator and easy enough for a non-IT person.
A great overview on how to manage security in the future! 16 mai 2013
Par A. Matthew - Publié sur Amazon.com
Format: Broché
The book is written so that it can be understood and relates to both ends of the scale - the Geek and the Senior Manager.

I visit a lot of companies and find two extremes, they are either too lax or too extreme. Similarly, colleagues go overboard on the word risk,. This book provides a great overview on managing risk and most important, the fact that you can accept risk providing you have the information relating to it. Taking these principles in mind, Malcolm takes you through various areas of information security and demonstrates that instead of following a blind lock-down mode, there is more to gain from allowing to business to explore new areas, do more things, once you have these risk principles in mind.

A good read and if you follow the principles in reality, you have a good chance of actually getting a good nights sleep!
Informative.. 1 mars 2014
Par Daniel Allen - Publié sur Amazon.com
Format: Format Kindle Achat vérifié
Although I haven't read a lot of this book (It's Basically a Reference Book). It has a lot of Good info. in it. It's well written and it's really a good book to have on hand to read off and on to get a good understanding of the (SECURITY ASPECTS) of the computers that play an ever increasing force in world and YOUR personal Life. Price is right go ahead and add it to your collection..
Ces commentaires ont-ils été utiles ? Dites-le-nous

Rechercher des articles similaires par rubrique


Commentaires

Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?