This book—a sequel to Moschovitis’ well-received Cybersecurity Program Development for Business—explains which regulations apply in which regions, how they relate to the end goal of privacy, and how to build privacy into both new and existing cybersecurity programs. Keeping up with swiftly changing technology and business landscapes is no easy task. Moschovitis provides down-to-earth, act…
CONTENTS: 1. Information security risk management imperatives and opportunities 2. Information security risk management defined 3. Information security risk management standards 4. A survey of available information security risk management methods and tools 5. Methodologies examples : COBIT and OCTAVE 6. Risk management issues and organization specifics 7. Assessing organization an…
Table of contents Section 1 Security to date 1. What Is Security Convergence? 2. Why sould you care? 3. Cultural differences Section 2 THe changing of the guard 4. Changing the threat paradigm 5. The Changing Security Environment 6. The Changing Business Model 7. The Ever-Advancing Micro Chip 8. Leveraging Technology Section 3 The new world 9. Disruptive Technology a…