Paperback Edition
Paperback
284 pages
$34.95
Choose vendor to order paperback edition
BrownWalker Press
Amazon.com
Barnes & Noble
Harvard Book Store
Return policy
PDF eBook
Entire PDF eBook
5583kB
$32
Get instant access to an entire eBook
Buy PDF Password
Download Complete PDF
eBook editions
How to Manage Cybersecurity Risk
A Security Leader's Roadmap with Open FAIR


Publisher: | Universal Publishers |
Pub date: | 2019 |
Pages: | 284 |
ISBN-10: | 1627342761 |
ISBN-13: | 9781627342766 |
Categories: | Computer Science Computers Business & Economics |
Abstract
Protecting information systems to reduce the risk of security incidents is critical for organizations today. This writing provides instruction for security leaders on the processes and techniques for managing a security program. It contains practical information on the breadth of information security topics, referring to many other writings that provide details on technical security topics. This provides foundation for a security program responsive to technology developments and an evolving threat environment.The security leader may be engaged by an organization that is in crisis, where the priority action is to recover from a serious incident. This work offers foundation knowledge for the security leader to immediately apply to the organization's security program while improving it to the next level, organized by development stage:
• Reactive--focused on incident detection and response
• Planned--control requirements, compliance and reporting
• Managed--integrated security business processes
The security leader must also communicate with the organization executive, whose focus is on results such as increasing revenues or reducing costs. The security leader may initially be welcomed as the wizard who applies mysterious skills to resolve an embarrassing incident. But the organization executive will lose patience with a perpetual crisis and demand concrete results. This writing explains how to communicate in terms executives understand.
WORDS OF PRAISE and REVIEWS
See Book review by Ben Rothke of RSA Cconference (2020-Feb-28)
Chris has a depth of knowledge and understanding with a rational approach to information security born from a career as a practitioner and leader. I really like his practical methodology to solving what appears to be a complex issue, simplifying the approach to identifying the challenges and presenting solutions. He outlines the necessity to fully understand the lifecycle of cyber security; identifying the issues, cataloguing your assets, defining responsibilities so that you can hold people to account, mapping your control frameworks, identifying your dependencies including your people and your third parties, exercising your crisis plans, then to reporting on the status. 'Plan--Do--Check--Act!'
Kevin Williams,Head of the International Information Integrity Institute
Chris offers practical instructions and real-world examples of how to approach, describe, and action the mystical world of cyber security. Leveraging his 35+ years of experience he shows cyber professional how to dissect problems into logical, achievable results for both technical staff and senior management. His conversational writing style, meaningful examples, and sequencing of actions allows the reader to define a roadmap that is tailored to their organizational maturity and structure. New cyber security professionals will welcome this how-to guide, while seasoned professionals will recognize the many deliverables they have left undone. Yet, the greatest gift for the reader is new insight on how good cyber practices allow you to quantify risk. Chris' introduction to the FAIR methodology de-mystifies the quantification of risk, empowers senior managers to make more informed decisions and defines critical priorities for the cyber teams.
Keith H. Herndon, VP of Cyber Security and Chief Information Security Officer, Baker Hughes
One of the hardest decisions a chief information security officer faces is defining the right problem solve. In this book, Chris describes the approach to solve the right problem, that of how to effectively manage the risk of information technology. He presents a refreshingly pragmatic approach ranging from immediate crisis management through cost benefit analysis of an information security strategy. In this way, he takes the CISO on a path of maturity from a novice incident fire fighter to a mature, strategic organizational leader. By reading and applying this book, information security professionals everywhere will learn tactical and strategic action they can take now to build more effective security organizations.
Mike Jerbic, Chair, The Open Group Security Forum
How to Manage Cybersecurity Risk" is a phenomenal resource for those people who want to do "risk management right." It is a wealth of experience from a passionate, seasoned professional who has tackled some of the industry's biggest risk scenarios and problems. It is a "must have" for both experienced GRC professionals as well as those new to this growing industry.
Alex Hutton, Security Executive
How to Manage Cybersecurity Risk is clearly written. By structuring it around three stages of cyber security maturity - Reactive, Planned, and then Managed - Chris ensures that security leaders at all levels will find it useful. He takes newly appointed security leaders of organizations mired in the Reactive stage firmly in hand, and guides them through the key steps required to stabilize the organization's security posture. For organizations in the Planned and Managed stages, Chris provides many valuable tools including excellent process templates for risk management, policy management, and more. He also discusses how to use quantitative Open FAIR risk analysis, even in the early stages, for security planning and risk analysis processes.
Dan Blum, Managing Partner and Principal Consultant, Security Architects, LLC
About the Author
Christopher Christopher T. Carlson is a pioneer, having arrived in his first computing security assignment at the dawn of the field in 1982. He created or substantially evolved practices in his security assignments including classified computing security, computing security policy and controls, security awareness, business unit security support, security assessments, access administration including role-based access, risk analysis and management, application security development life cycle, and international security. The goal of this writing is to provide lessons from the field so that those who follow need not start from scratch.
Paperback Edition
Paperback
284 pages
$34.95
Choose vendor to order paperback edition
BrownWalker Press
Amazon.com
Barnes & Noble
Harvard Book Store
Return policy
PDF eBook
Entire PDF eBook
5583kB
$32
Get instant access to an entire eBook
Buy PDF Password
Download Complete PDF
eBook editions
Share this book
Relevant events
DEC
11
IKBS 2025
2025 International Conference of Intelligent and Knowledge-Based Systems (IKBS 2025)
2025 International Conference on Intelligent and Knowledge-Based Systems (IKBS 2025) is organized by Nanchang Hangkong University and will be held in Nanchang, China during December 11-14, 2025.
The IKBS is a flagship a...
2025 International Conference of Intelligent and Knowledge-Based Systems (IKBS 2025)
2025 International Conference on Intelligent and Knowledge-Based Systems (IKBS 2025) is organized by Nanchang Hangkong University and will be held ...
2025 International Conference of Intelligent and Knowledge-Based Systems (IKBS 2025)
2025 International Conference on Intelligent and Knowledge-Based Systems ...
2025 International Conference of Intelligent and Knowledge-Based Systems (IKBS 2025)
2025 International Conference on Intelligent and...
11 - 14 Dec 2025
Nanchang, China
OCT
15
NexGen Banking Summit 15th - 16th, October, 2025
Join us on October 15th-16th, 2025, at the Hilton Hotel in London for the first-ever summit focused on how Generative AI is changing banking! With 78% of banks already using or planning to use this technology, it’s clear t...
NexGen Banking Summit 15th - 16th, October, 2025
Join us on October 15th-16th, 2025, at the Hilton Hotel in London for the first-ever summit focused on how Generative AI is changing banking! With ...
NexGen Banking Summit 15th - 16th, October, 2025
Join us on October 15th-16th, 2025, at the Hilton Hotel in London for the...
NexGen Banking Summit 15th - 16th, October, 2025
Join us on October 15th-16th, 2025, at the Hilto...
15 - 16 Oct 2025
London, United Kingdom
OCT
16
IEEE ICCT 2025
2025 IEEE 25th International Conference on Communication Technology (25th IEEE ICCT)
Proceedings Publication:
Accepted academic papers will be published by IEEE, and conference papers that meet IEEE Standards can be indexed by the IEEE Xplore Digital Library.
IEEE ICCT2025 has been listed on IEEE confere...
2025 IEEE 25th International Conference on Communication Technology (25th IEEE ICCT)
Proceedings Publication:
Accepted academic papers will be published by IEEE, and conference papers that meet IEEE Standards can be indexed by the ...
2025 IEEE 25th International Conference on Communication Technology (25th IEEE ICCT)
Proceedings Publication:
Accepted academic papers will be published by I...
2025 IEEE 25th International Conference on Communication Technology (25th IEEE ICCT)
Proceedings Publication:
Accepted academic pape...
16 - 18 Oct 2025
Shenyang, China
OCT
17
ICBSP 2025
2025 10th International Conference on Biomedical Imaging, Signal Processing (ICBSP 2025)
Paper Publication:
1. ICBSP 2025 SPIE Conference Proceedings: indexed by Ei Compendex and Scopus, and submitted to be reviewed by CPCI.
2. Journal of Image and Graphics (JOIG, ISSN: 2301-3699), Cite Score: 4.1, which wil...
2025 10th International Conference on Biomedical Imaging, Signal Processing (ICBSP 2025)
Paper Publication:
1. ICBSP 2025 SPIE Conference Proceedings: indexed by Ei Compendex and Scopus, and submitted to be reviewed by CPCI.
2. Journa...
2025 10th International Conference on Biomedical Imaging, Signal Processing (ICBSP 2025)
Paper Publication:
1. ICBSP 2025 SPIE Conference Proceedings: indexed by...
2025 10th International Conference on Biomedical Imaging, Signal Processing (ICBSP 2025)
Paper Publication:
1. ICBSP 2025 SPIE Conferenc...
17 - 19 Oct 2025
Xiamen, China
OCT
17
ICICM 2025
2025 The 10th International Conference on Integrated Circuits and Microsystems (ICICM 2025)
Publication:
The accepted and registered papers will be publication in Conference Proceedings, which will be indexed by EI Compendex, Scopus, etc.
2025 The 10th International Conference on Integrated Circuits and Microsystems (ICICM 2025)
Publication:
The accepted and registered papers will be publication in Conference Proceedings, which will be indexed by EI Compendex, Scopus, etc.
2025 The 10th International Conference on Integrated Circuits and Microsystems (ICICM 2025)
Publication:
The accepted and registered papers will be publication in C...
2025 The 10th International Conference on Integrated Circuits and Microsystems (ICICM 2025)
Publication:
The accepted and registered papers...
17 - 19 Oct 2025
Hefei, China
OCT
17
WORLDMBE
8th World Conference on Management, Business and Economics (WORLDMBE)
Join Us at WORLDMBE 2025!
8th World Conference on Management, Business and Economics
📍 Lyon, France | 📅 October 19–21, 2025
Immerse yourself in innovation and discovery at WORLDMBE 2025—a leading international confe...
8th World Conference on Management, Business and Economics (WORLDMBE)
Join Us at WORLDMBE 2025!
8th World Conference on Management, Business and Economics
📍 Lyon, France | 📅 October 19–21, 2025
Immerse yourself...
8th World Conference on Management, Business and Economics (WORLDMBE)
Join Us at WORLDMBE 2025!
8th World Conference on Management, Business a...
8th World Conference on Management, Business and Economics (WORLDMBE)
Join Us at WORLDMBE 2025!
8th World Conference ...
17 - 19 Oct 2025
Lyon, France
OCT
18
AIMLNET 2025
5th International conference on AI, Machine Learning in Communications and Networks (AIMLNET 2025)
5th International conference on AI, Machine Learning in Communications
and Networks (AIMLNET 2025)
October 18 -19, 2025 ,Sydney, Australia
https://csty2025.org/aimlnet/index
Scope & Topics
5th International conferen...
5th International conference on AI, Machine Learning in Communications and Networks (AIMLNET 2025)
5th International conference on AI, Machine Learning in Communications
and Networks (AIMLNET 2025)
October 18 -19, 2025 ,Sydney, Australia
https...
5th International conference on AI, Machine Learning in Communications and Networks (AIMLNET 2025)
5th International conference on AI, Machine Learning in Communications
a...
5th International conference on AI, Machine Learning in Communications and Networks (AIMLNET 2025)
5th International conference on AI, Machine Lear...
18 - 19 Oct 2025
Sydney, Australia, Australia
OCT
23
WCSP 2025
The Seventeenth International Conference on Wireless Communications and Signal Processing (WCSP 2025)
WCSP is an annual International Conference on Wireless Communications and Signal Processing (WCSP). The aim of the conference is to provide an international forum that brings together researchers from academia and practiti...
The Seventeenth International Conference on Wireless Communications and Signal Processing (WCSP 2025)
WCSP is an annual International Conference on Wireless Communications and Signal Processing (WCSP). The aim of the conference is to provide an inte...
The Seventeenth International Conference on Wireless Communications and Signal Processing (WCSP 2025)
WCSP is an annual International Conference on Wireless Communications and...
The Seventeenth International Conference on Wireless Communications and Signal Processing (WCSP 2025)
WCSP is an annual International Conference on Wi...
23 - 25 Oct 2025
Chongqing, China
OCT
24
WSAI 2025
2025 the 7th World Symposium on Artificial Intelligence (WSAI 2025)
Publication:
All submitted papers will undergo rigorous peer review by the conference committee. Accepted papers will be published in the WSAI 2025 Conference Proceedings (Scopus & Ei Compendex indexed).
2025 the 7th World Symposium on Artificial Intelligence (WSAI 2025)
Publication:
All submitted papers will undergo rigorous peer review by the conference committee. Accepted papers will be published in the WSAI 202...
2025 the 7th World Symposium on Artificial Intelligence (WSAI 2025)
Publication:
All submitted papers will undergo rigorous peer review by t...
2025 the 7th World Symposium on Artificial Intelligence (WSAI 2025)
Publication:
All submitted papers will undergo ...
24 - 26 Oct 2025
Nanchang, China
OCT
24
FCS 2025
The Eighth International Conference on Frontiers in Cyber Security (FCS 2025)
The conference proceedings will be published by Springer Communications in Computer and Information Science (CCIS), which is indexed by EI.
The Eighth International Conference on Frontiers in Cyber Security (FCS 2025)
The conference proceedings will be published by Springer Communications in Computer and Information Science (CCIS), which is indexed by EI.
The Eighth International Conference on Frontiers in Cyber Security (FCS 2025)
The conference proceedings will be published by Springer Communications i...
The Eighth International Conference on Frontiers in Cyber Security (FCS 2025)
The conference proceedings will be published by ...
24 - 26 Oct 2025
Guiyang, China