Security Metrics, A Beginner's Guide

Security Metrics, A Beginner's Guide
Author :
Publisher : McGraw Hill Professional
Total Pages : 433
Release :
ISBN-10 : 9780071744010
ISBN-13 : 0071744010
Rating : 4/5 (10 Downloads)

Book Synopsis Security Metrics, A Beginner's Guide by : Caroline Wong

Download or read book Security Metrics, A Beginner's Guide written by Caroline Wong and published by McGraw Hill Professional. This book was released on 2011-10-06 with total page 433 pages. Available in PDF, EPUB and Kindle. Book excerpt: Security Smarts for the Self-Guided IT Professional “An extraordinarily thorough and sophisticated explanation of why you need to measure the effectiveness of your security program and how to do it. A must-have for any quality security program!”—Dave Cullinane, CISSP, CISO & VP, Global Fraud, Risk & Security, eBay Learn how to communicate the value of an information security program, enable investment planning and decision making, and drive necessary change to improve the security of your organization. Security Metrics: A Beginner's Guide explains, step by step, how to develop and implement a successful security metrics program. This practical resource covers project management, communication, analytics tools, identifying targets, defining objectives, obtaining stakeholder buy-in, metrics automation, data quality, and resourcing. You'll also get details on cloud-based security metrics and process improvement. Templates, checklists, and examples give you the hands-on help you need to get started right away. Security Metrics: A Beginner's Guide features: Lingo--Common security terms defined so that you're in the know on the job IMHO--Frank and relevant opinions based on the author's years of industry experience Budget Note--Tips for getting security technologies and processes into your organization's budget In Actual Practice--Exceptions to the rules of security explained in real-world contexts Your Plan--Customizable checklists you can use on the job now Into Action--Tips on how, why, and when to apply new skills and techniques at work Caroline Wong, CISSP, was formerly the Chief of Staff for the Global Information Security Team at eBay, where she built the security metrics program from the ground up. She has been a featured speaker at RSA, ITWeb Summit, Metricon, the Executive Women's Forum, ISC2, and the Information Security Forum.


Security Metrics, A Beginner's Guide Related Books

Security Metrics, A Beginner's Guide
Language: en
Pages: 433
Authors: Caroline Wong
Categories: Computers
Type: BOOK - Published: 2011-10-06 - Publisher: McGraw Hill Professional

DOWNLOAD EBOOK

Security Smarts for the Self-Guided IT Professional “An extraordinarily thorough and sophisticated explanation of why you need to measure the effectiveness of
Security Metrics
Language: en
Pages: 356
Authors: Andrew Jaquith
Categories: Computers
Type: BOOK - Published: 2007-03-26 - Publisher: Pearson Education

DOWNLOAD EBOOK

The Definitive Guide to Quantifying, Classifying, and Measuring Enterprise IT Security Operations Security Metrics is the first comprehensive best-practice guid
PRAGMATIC Security Metrics
Language: en
Pages: 507
Authors: W. Krag Brotby
Categories: Business & Economics
Type: BOOK - Published: 2016-04-19 - Publisher: CRC Press

DOWNLOAD EBOOK

Other books on information security metrics discuss number theory and statistics in academic terms. Light on mathematics and heavy on utility, PRAGMATIC Securit
Web Application Security, A Beginner's Guide
Language: en
Pages: 353
Authors: Bryan Sullivan
Categories: Computers
Type: BOOK - Published: 2011-12-06 - Publisher: McGraw Hill Professional

DOWNLOAD EBOOK

Security Smarts for the Self-Guided IT Professional “Get to know the hackers—or plan on getting hacked. Sullivan and Liu have created a savvy, essentials-ba
Security Information and Event Management (SIEM) Implementation
Language: en
Pages: 465
Authors: David R. Miller
Categories: Computers
Type: BOOK - Published: 2010-11-05 - Publisher: McGraw Hill Professional

DOWNLOAD EBOOK

Implement a robust SIEM system Effectively manage the security information and events produced by your network with help from this authoritative guide. Written