Security Metrics: A Beginners Guide (Anglais) Broché – 1 novembre 2000
|Neuf à partir de||Occasion à partir de|
- Choisissez parmi 17 000 points de collecte en France
- Les membres du programme Amazon Premium bénéficient de livraison gratuites illimitées
- Trouvez votre point de collecte et ajoutez-le à votre carnet d’adresses
- Sélectionnez cette adresse lors de votre commande
Les clients ayant acheté cet article ont également acheté
Descriptions du produit
Présentation de l'éditeur
Security Smarts for the Self-Guided IT Professional
“An extraordinarily thorough and sophisticated explanation of why you need to measure the effectiveness of your security program and how to do it. A must-have for any quality security program!” —Dave Cullinane, CISSP, CISO & VP, Global Fraud, Risk & Security, eBay
Learn how to communicate the value of an information security program, enable investment planning and decision making, and drive necessary change to improve the security of your organization. Security Metrics: A Beginner's Guide explains, step by step, how to develop and implement a successful security metrics program.
This practical resource covers project management, communication, analytics tools, identifying targets, defining objectives, obtaining stakeholder buy-in, metrics automation, data quality, and resourcing. You'll also get details on cloud-based security metrics and process improvement. Templates, checklists, and examples give you the hands-on help you need to get started right away.
Security Metrics: A Beginner's Guide features:
- Lingo--Common security terms defined so that you're in the know on the job
- IMHO--Frank and relevant opinions based on the author's years of industry experience
- Budget Note--Tips for getting security technologies and processes into your organization's budget
- In Actual Practice--Exceptions to the rules of security explained in real-world contexts
- Your Plan--Customizable checklists you can use on the job now
- Into Action--Tips on how, why, and when to apply new skills and techniques at work
Caroline Wong, CISSP, was formerly the Chief of Staff for the Global Information Security Team at eBay, where she built the security metrics program from the ground up. She has been a featured speaker at RSA, ITWeb Summit, Metricon, the Executive Women's Forum, ISC2, and the Information Security Forum.
Biographie de l'auteur
Caroline Wong, CISSP, was formerly the Chief of Staff for the Global Information Security Team at eBay and built eBay’s security metrics program from the ground up. Caroline is a frequent featured speaker at numerous industry conferences, including RSA, Metricon, the Executive Women’s Forum, and the Information Security Forum. Caroline is a founding member of the Cloud Security Alliance Metrics Working Group and was awarded the “One to Watch” category at the Executive Women’s Forum Women of Influence Awards in 2010.
Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.
Pour obtenir l'appli gratuite, saisissez votre ou numéro de téléphone mobile.
Détails sur le produit
Commentaires en ligne
Commentaires client les plus utiles sur Amazon.com (beta)
Every once in a while we get to read something that is so startlingly clear that we wonder why it took so long for somebody to write it. It isn't that we didn't know each step, it's we needed somebody to put the steps in order so we can get where we want to go. Caroline articulates where we want to go in a well thought out, logical, calculated and justifiable manner. Caroline provides the objective, justification and process for creating an exquisitely managed security metric program. She provides the justification for metrics, the approach to meaningful analysis, the process for defining and executing the project. The she demonstrates how to assure that management gets the right information at the right time.
My only problem with this book is that the title suggests that it's not for seasoned or experienced security professionals. This is not just a beginner's guide; rather it is a practical and well-thought out roadmap for implementing a security metric program. Caroline even provides templates and checklists to support such a program. With this book in hand security teams are well armed to comply with the maxim: you have to measure it in order to manage it.
- Lisa Lee, an Information Security Professional