Security Risk Management - The Driving Force for Operational Resilience: The Firefighting Paradox (Security, Audit and Leadership Series)
Description:
The importance of businesses being 'operationally resilient' is becoming increasingly important, and a driving force behind whether an organization can ensure that its valuable business operations can 'bounce back' from or manage to evade impactful occurrences is its security risk management capabilities.
In this book, we change the perspective on an organization's operational resilience capabilities so that it shifts from being a reactive (tick box) approach to being proactive. The perspectives of every chapter in this book focus on risk profiles and how your business can reduce these profiles using effective mitigation measures.
The book is divided into two sections:
1. Security Risk Management (SRM).
All the components of security risk management contribute to your organization's operational resilience capabilities, to help reduce your risks.
- Reduce the probability/ likelihood.
2. Survive to Operate.
If your SRM capabilities fail your organization, these are the components that are needed to allow you to quickly 'bounce back.'
- Reduce the severity/ impact.
Rather than looking at this from an operational resilience compliance capabilities aspect, we have written these to be agnostic of any specific operational resilience framework (e.g., CERT RMM, ISO 22316, SP 800- 160 Vol. 2 Rev. 1, etc.), with the idea of looking at operational resilience through a risk management lens instead.
This book is not intended to replace these numerous operational resilience standards/ frameworks but, rather, has been designed to complement them by getting you to appreciate their value in helping to identify and mitigate your operational resilience risks.
Unlike the cybersecurity or information security domains, operational resilience looks at risks from a business-oriented view, so that anything that might disrupt your essential business operations are risk-assessed and appropriate countermeasures identified and applied. Consequently, this book is not limited to cyberattacks or the loss of sensitive data but, instead, looks at things from a holistic business-based perspective.
Low Price Summary
Top Bookstores
DISCLOSURE: We're an eBay Partner Network affiliate and we earn commissions from purchases you make on eBay via one of the links above.
Want a Better Price Offer?
Set a price alert and get notified when the book starts selling at your price.
Want to Report a Pricing Issue?
Let us know about the pricing issue you've noticed so that we can fix it.