Contents

About ApressOpen

Foreword

About the Author

Preface

Acknowledgments

images Chapter 1: Introduction

Protect to Enable

Keeping the Company Legal: The Regulatory Flood

The Rapid Proliferation of Information and Devices

The Changing Threat Landscape

A New Approach to Managing Risk

images Chapter 2: The Misperception of Risk

The Subjectivity of Risk Perception

How Employees Misperceive Risk

How Security Professionals Misperceive Risk

How Decision Makers Misperceive Risk

How to Mitigate the Misperception of Risk

Communication Is Essential

images Chapter 3: Governance and Internal Partnerships

Information Risk Governance

Finding the Right Governance Structure

Intel’s Information Risk Governance

Building Internal Partnerships

Conclusion

images Chapter 4: External Partnerships

The Value of External Partnerships

External Partnerships: Types and Tiers

Conclusion

images Chapter 5: People Are the Perimeter

The Shifting Perimeter

Examining the Risks

Adjusting Behavior

The Payoff

Roundabouts and Stop Signs

The Security Benefits of Personal Use

Sealing the Gaps

The IT Professional

Insider Threats

Finding the Balance

images Chapter 6: Emerging Threats and Vulnerabilities

Structured Methods for Identifying Threat Trends

Trends That Span the Threat Landscape

Key Threat Activity Areas

The Web As an Attack Surface

Conclusion

images Chapter 7: A New Security Architecture to Improve Business Agility

Business Trends and Architecture Requirements

IT Consumerization

New Business Needs

Cloud Computing

Changing Threat Landscape

Privacy and Regulatory Requirements

New Architecture

Trust Calculation

Security Zones

Balanced Controls

Users and Data: The New Perimeters

Conclusion

images Chapter 8: Looking to the Future

Internet of Things

Compute Continuum

Cloud Computing

Business Intelligence and Big Data

Business Benefits and Risks

New Security Capabilities

Baseline Security

Context-Aware Security

Conclusion: The Implications for CISOs

images Chapter 9: The 21st Century CISO

Chief Information Risk Officer

The Z-Shaped Individual

Foundational Skills

Becoming a Storyteller

Fear Is Junk Food

Accentuating the Positive

Demonstrating the Reality of Risk

The CISO’s Sixth Sense

Taking Action at the Speed of Trust

The CISO As a Leader

Learning from Other Business Leaders

Looking to the Future

images Chapter 10: References

Index

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset