ABSTRACT

The growing complexity of today's interconnected systems has not only increased the need for improved information security, but also helped to move information from the IT backroom to the executive boardroom as a strategic asset. And, just like the tip of an iceberg is all you see until you run into it, the risks to your information are mostly invi

chapter 1|8 pages

INTRODUCTION: WHY RISK MANAGEMENT?

chapter 2|10 pages

Liability

chapter 3|6 pages

Service Delivery

chapter 4|6 pages

Overview

chapter 5|20 pages

Basic Concepts, Principles, and Practices

chapter 6|46 pages

Risk Assessment, Analysis, and Procedures

chapter 7|6 pages

Metrics

part 8|2 pages

Best Practices

chapter 9|8 pages

PRINCIPLES AND CONCEPTS: SECTION SUMMARY

chapter 10|14 pages

Product Management

chapter 11|14 pages

Process Management

chapter 12|12 pages

Project Management

chapter 13|4 pages

IT Service Management

part 14|2 pages

Reporting on Service Delivery

chapter 15|8 pages

SERVICE DELIVERY: SECTION SUMMARY

chapter 16|54 pages

Information Management

chapter 17|66 pages

Information Protection

chapter 18|12 pages

E-Discovery

chapter 19|4 pages

Privacy

chapter 20|10 pages

Policies and Procedures

chapter 22|8 pages

LIABILITIES MANAGEMENT: SECTION SUMMARY

chapter 23|8 pages

Designing a Risk Management Strategy

chapter 24|4 pages

Forward-Looking Risk Management

part 25|2 pages

Preparing for a “Black Swan”

chapter 26|4 pages

Conclusion