Paperback Edition
Paperback
284 pages
$34.95
Choose vendor to order paperback edition
BrownWalker Press Amazon.com Barnes & Noble Harvard Book Store Return policy
PDF eBook
Sample Preview
Size 745kB
Free
Download a sample of the first 25 pages
Download Preview

Entire PDF eBook
5583kB
$32
Get instant access to an entire eBook
Buy PDF Password Download Complete PDF
eBook editions

How to Manage Cybersecurity Risk

A Security Leader's Roadmap with Open FAIR

small book icon  Paperback   small ebook icon   eBook PDF
Publisher:  Universal Publishers
Pub date:  2019
Pages:  284
ISBN-10:  1627342761
ISBN-13:  9781627342766
Categories:  Computer Science  Computers  Business & Economics

Abstract

Protecting information systems to reduce the risk of security incidents is critical for organizations today. This writing provides instruction for security leaders on the processes and techniques for managing a security program. It contains practical information on the breadth of information security topics, referring to many other writings that provide details on technical security topics. This provides foundation for a security program responsive to technology developments and an evolving threat environment.

The security leader may be engaged by an organization that is in crisis, where the priority action is to recover from a serious incident. This work offers foundation knowledge for the security leader to immediately apply to the organization's security program while improving it to the next level, organized by development stage:
• Reactive--focused on incident detection and response
• Planned--control requirements, compliance and reporting
• Managed--integrated security business processes
The security leader must also communicate with the organization executive, whose focus is on results such as increasing revenues or reducing costs. The security leader may initially be welcomed as the wizard who applies mysterious skills to resolve an embarrassing incident. But the organization executive will lose patience with a perpetual crisis and demand concrete results. This writing explains how to communicate in terms executives understand.

WORDS OF PRAISE and REVIEWS

See Book review by Ben Rothke of RSA Cconference (2020-Feb-28)

Chris has a depth of knowledge and understanding with a rational approach to information security born from a career as a practitioner and leader. I really like his practical methodology to solving what appears to be a complex issue, simplifying the approach to identifying the challenges and presenting solutions. He outlines the necessity to fully understand the lifecycle of cyber security; identifying the issues, cataloguing your assets, defining responsibilities so that you can hold people to account, mapping your control frameworks, identifying your dependencies including your people and your third parties, exercising your crisis plans, then to reporting on the status. 'Plan--Do--Check--Act!'
Kevin Williams,Head of the International Information Integrity Institute

Chris offers practical instructions and real-world examples of how to approach, describe, and action the mystical world of cyber security. Leveraging his 35+ years of experience he shows cyber professional how to dissect problems into logical, achievable results for both technical staff and senior management. His conversational writing style, meaningful examples, and sequencing of actions allows the reader to define a roadmap that is tailored to their organizational maturity and structure. New cyber security professionals will welcome this how-to guide, while seasoned professionals will recognize the many deliverables they have left undone. Yet, the greatest gift for the reader is new insight on how good cyber practices allow you to quantify risk. Chris' introduction to the FAIR methodology de-mystifies the quantification of risk, empowers senior managers to make more informed decisions and defines critical priorities for the cyber teams.
Keith H. Herndon, VP of Cyber Security and Chief Information Security Officer, Baker Hughes

One of the hardest decisions a chief information security officer faces is defining the right problem solve. In this book, Chris describes the approach to solve the right problem, that of how to effectively manage the risk of information technology. He presents a refreshingly pragmatic approach ranging from immediate crisis management through cost benefit analysis of an information security strategy. In this way, he takes the CISO on a path of maturity from a novice incident fire fighter to a mature, strategic organizational leader. By reading and applying this book, information security professionals everywhere will learn tactical and strategic action they can take now to build more effective security organizations.
Mike Jerbic, Chair, The Open Group Security Forum

How to Manage Cybersecurity Risk" is a phenomenal resource for those people who want to do "risk management right." It is a wealth of experience from a passionate, seasoned professional who has tackled some of the industry's biggest risk scenarios and problems. It is a "must have" for both experienced GRC professionals as well as those new to this growing industry.
Alex Hutton, Security Executive

How to Manage Cybersecurity Risk is clearly written. By structuring it around three stages of cyber security maturity - Reactive, Planned, and then Managed - Chris ensures that security leaders at all levels will find it useful. He takes newly appointed security leaders of organizations mired in the Reactive stage firmly in hand, and guides them through the key steps required to stabilize the organization's security posture. For organizations in the Planned and Managed stages, Chris provides many valuable tools including excellent process templates for risk management, policy management, and more. He also discusses how to use quantitative Open FAIR risk analysis, even in the early stages, for security planning and risk analysis processes.
Dan Blum, Managing Partner and Principal Consultant, Security Architects, LLC

About the Author

Christopher Christopher T. Carlson is a pioneer, having arrived in his first computing security assignment at the dawn of the field in 1982. He created or substantially evolved practices in his security assignments including classified computing security, computing security policy and controls, security awareness, business unit security support, security assessments, access administration including role-based access, risk analysis and management, application security development life cycle, and international security. The goal of this writing is to provide lessons from the field so that those who follow need not start from scratch.



Paperback Edition
Paperback
284 pages
$34.95
Choose vendor to order paperback edition
BrownWalker Press Amazon.com Barnes & Noble Harvard Book Store Return policy
PDF eBook
Sample Preview
Size 745kB
Free
Download a sample of the first 25 pages
Download Preview

Entire PDF eBook
5583kB
$32
Get instant access to an entire eBook
Buy PDF Password Download Complete PDF
eBook editions
Share this book



Relevant events
APR
8
EVOMUSART 2026
15th International Conference on Artificial Intelligence in Music, Sound, Art and Design The 15th International Conference on Artificial Intelligence in Music, Sound, Art and Design (EvoMUSART) will take place on 8–10 April 2026, in Toulouse, France, as part of the evo* event. EvoMUSART webpage: www.evostar...
15th International Conference on Artificial Intelligence in Music, Sound, Art and Design The 15th International Conference on Artificial Intelligence in Music, Sound, Art and Design (EvoMUSART) will take place on 8–10 April 2026, in Tou...
15th International Conference on Artificial Intelligence in Music, Sound, Art and Design The 15th International Conference on Artificial Intelligence in Music, So...
08 - 10 Apr 2026
Online Event | France
FEB
20
ARMEACONF2026
8th International conference on Advanced Research in Management, Economics and Accounting 📅 Date: 20 – 22 February 2026 📍 Venue: Barcelona, Spain 🎓 Event Type: Academic Conference ________________________________________ 🌍 About the Conference The 8th International Conference on Advanced Research in Ma...
8th International conference on Advanced Research in Management, Economics and Accounting 📅 Date: 20 – 22 February 2026 📍 Venue: Barcelona, Spain 🎓 Event Type: Academic Conference ________________________________________ 🌍 About ...
8th International conference on Advanced Research in Management, Economics and Accounting 📅 Date: 20 – 22 February 2026 📍 Venue: Barcelona, Spain 🎓 Event Type...
20 - 22 Feb 2026
Online Event | Spain
FEB
20
BMMCONF
4th Global conference on Business, Management and Marketing (BMMCONF) Description Join Us at BMMCONF 2026! 📍 London, United Kingdom | 📅 February 20-22, 2026 Experience the forefront of innovation and discovery at BMMCONF 2026—an esteemed global conference uniting experts, academics, a...
4th Global conference on Business, Management and Marketing (BMMCONF) Description Join Us at BMMCONF 2026! 📍 London, United Kingdom | 📅 February 20-22, 2026 Experience the forefront of innovation and discovery ...
4th Global conference on Business, Management and Marketing (BMMCONF) Description Join Us at BMMCONF 2026! 📍 London, United Kingdom | 📅 Feb...
4th Global conference on Business, Management and Marketing (BMMCONF) Description Join Us at BMMCONF 2026! 📍 London...
20 - 22 Feb 2026
London, United Kingdom
FEB
26
ICMEH2026
17th International Conference on Management, Economics and Humanities (ICMEH) The 17th International Conference on Management, Economics and Humanities (ICMEH) will be held from 26 to 28 February 2026 in Rotterdam, Netherlands. This premier academic gathering brings together scholars, educators,...
17th International Conference on Management, Economics and Humanities (ICMEH) The 17th International Conference on Management, Economics and Humanities (ICMEH) will be held from 26 to 28 February 2026 in Rotterdam, Netherland...
17th International Conference on Management, Economics and Humanities (ICMEH) The 17th International Conference on Management, Economics and Humanities...
17th International Conference on Management, Economics and Humanities (ICMEH) The 17th International Conference on Management,...
26 - 26 Feb 2026
Rotterdam, Netherlands
FEB
26
How to Conduct an ACH Risk Assessment and Develop an Effective ACH Risk Management Program Use coupon COMPLIANCE15 to get 15% discount on this virtual seminar This virtual 2-day seminar/workshop will identify the areas of ACH Risk that ODFI's and RDFI's are exposed to when originating, receiving, or processin...
How to Conduct an ACH Risk Assessment and Develop an Effective ACH Risk Management Program Use coupon COMPLIANCE15 to get 15% discount on this virtual seminar This virtual 2-day seminar/workshop will identify the areas of ACH Risk that...
How to Conduct an ACH Risk Assessment and Develop an Effective ACH Risk Management Program Use coupon COMPLIANCE15 to get 15% discount on this virtual seminar Th...
26 - 27 Feb 2026
Online Event | United States
FEB
27
IJCNC
International Journal of Computer Networks & Communications (IJCNC) - Scopus, ERA, WJCI Listed International Journal of Computer Networks & Communications (IJCNC) Citations, h-index, i10-index of IJCNC ---- Scopus, ERA Listed, WJCI Indexed ---- Scopus Cite Score 2024--1.8 https://airccse.org/journal/ijcnc.ht...
International Journal of Computer Networks & Communications (IJCNC) - Scopus, ERA, WJCI Listed International Journal of Computer Networks & Communications (IJCNC) Citations, h-index, i10-index of IJCNC ---- Scopus, ERA Listed, WJCI Indexed ...
International Journal of Computer Networks & Communications (IJCNC) - Scopus, ERA, WJCI Listed International Journal of Computer Networks & Communications (IJCNC) Cita...
27 - 28 Feb 2026
Sydney, Australia, Australia
FEB
27
ACSTY 2026
12th International Conference on AI, Computer Science and Information Technology (ACSTY 2026) 12th International Conference on AI, Computer Science and Information Technology (ACSTY 2026) February 27 ~ 28, 2026, Vancouver, Canada https://acsty2026.org/index Call for Papers 12th International Conference on A...
12th International Conference on AI, Computer Science and Information Technology (ACSTY 2026) 12th International Conference on AI, Computer Science and Information Technology (ACSTY 2026) February 27 ~ 28, 2026, Vancouver, Canada https://a...
12th International Conference on AI, Computer Science and Information Technology (ACSTY 2026) 12th International Conference on AI, Computer Science and Information Tec...
27 - 28 Feb 2026
Vancouver, Canada
FEB
27
ADCOM 2026
12th International Conference on Advanced Computing (ADCOM 2026) 12th International conference on Advanced Computing (ADCOM 2026) February 27 ~ 28, 2026, Vancouver, Canada https://acsty2026.org/adcom/index Scope 12th International Conference on Advanced Computing (ADCOM 2026) is ...
12th International Conference on Advanced Computing (ADCOM 2026) 12th International conference on Advanced Computing (ADCOM 2026) February 27 ~ 28, 2026, Vancouver, Canada https://acsty2026.org/adcom/index ...
12th International Conference on Advanced Computing (ADCOM 2026) 12th International conference on Advanced Computing (ADCOM 2026) Februa...
12th International Conference on Advanced Computing (ADCOM 2026) 12th International conference on Advanced Comput...
27 - 28 Feb 2026
Vancouver, Canada
FEB
27
ICCMB 2026
2026 the 9th International Conference on Computers in Management and Business (ICCMB 2026) Conference Proceedings: All submissions will be peer reviewed, the registered and presented papers will be published in ICCMB2026 Conference Proceedings.
2026 the 9th International Conference on Computers in Management and Business (ICCMB 2026) Conference Proceedings: All submissions will be peer reviewed, the registered and presented papers will be published in ICCMB2026 Conference Proce...
2026 the 9th International Conference on Computers in Management and Business (ICCMB 2026) Conference Proceedings: All submissions will be peer reviewed, the regis...
27 - 01 Mar 2026
Tokyo, Japan
FEB
28
ICIIP 2026
2026 14th International Conference on Intelligent Information Processing (ICIIP 2026) All accepted papers after proper registration and presentation will be published in the ICIIP 2026 International Conference Proceedings, which will be submitted to EI Compendex and Scopus for indexing.
2026 14th International Conference on Intelligent Information Processing (ICIIP 2026) All accepted papers after proper registration and presentation will be published in the ICIIP 2026 International Conference Proceedings, which will...
2026 14th International Conference on Intelligent Information Processing (ICIIP 2026) All accepted papers after proper registration and presentation will be pu...
28 - 02 Mar 2026
Hokkaido, Japan