Author: Rakeshnie Ramoutar-Prieschl
Publisher: Springer Nature
ISBN: 3030372812
Category : Science
Languages : en
Pages : 118
Book Description
This open access book provides an overview of the building blocks necessary for managing, steering and guiding the establishment of a research infrastructure (RI). It offers valuable insights into RI investment, access and management at the academic, grants management, agency and policy level, and serves as a useful guide for the research community, students, and those in the private sector wishing to understand the approaches and opportunities involved in the establishment, maintenance and management of research infrastructure platforms. Presenting a holistic view of RI investment and granting cycles from a South African perspective, the book’s target audience includes those working in science diplomacy, policymaking and science grants councils (especially in Africa) as well as funders and donors.
Management of Research Infrastructures: A South African Funding Perspective
Author: Rakeshnie Ramoutar-Prieschl
Publisher: Springer Nature
ISBN: 3030372812
Category : Science
Languages : en
Pages : 118
Book Description
This open access book provides an overview of the building blocks necessary for managing, steering and guiding the establishment of a research infrastructure (RI). It offers valuable insights into RI investment, access and management at the academic, grants management, agency and policy level, and serves as a useful guide for the research community, students, and those in the private sector wishing to understand the approaches and opportunities involved in the establishment, maintenance and management of research infrastructure platforms. Presenting a holistic view of RI investment and granting cycles from a South African perspective, the book’s target audience includes those working in science diplomacy, policymaking and science grants councils (especially in Africa) as well as funders and donors.
Publisher: Springer Nature
ISBN: 3030372812
Category : Science
Languages : en
Pages : 118
Book Description
This open access book provides an overview of the building blocks necessary for managing, steering and guiding the establishment of a research infrastructure (RI). It offers valuable insights into RI investment, access and management at the academic, grants management, agency and policy level, and serves as a useful guide for the research community, students, and those in the private sector wishing to understand the approaches and opportunities involved in the establishment, maintenance and management of research infrastructure platforms. Presenting a holistic view of RI investment and granting cycles from a South African perspective, the book’s target audience includes those working in science diplomacy, policymaking and science grants councils (especially in Africa) as well as funders and donors.
Business Continuity and Disaster Recovery Planning for IT Professionals
Author: Susan Snedaker
Publisher: Butterworth-Heinemann
ISBN: 0080553729
Category : Computers
Languages : en
Pages : 481
Book Description
Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Katrina Makes Landfall in the Gulf Coast. Avalanche Buries Highway in Denver. Tornado Touches Down in Georgia. These headlines not only have caught the attention of people around the world, they have had a significant effect on IT professionals as well. As technology continues to become more integral to corporate operations at every level of the organization, the job of IT has expanded to become almost all-encompassing. These days, it's difficult to find corners of a company that technology does not touch. As a result, the need to plan for potential disruptions to technology services has increased exponentially. That is what Business Continuity Planning (BCP) is: a methodology used to create a plan for how an organization will recover after a disaster of various types. It takes into account both security and corporate risk management tatics.There is a lot of movement around this initiative in the industry: the British Standards Institute is releasing a new standard for BCP this year. Trade shows are popping up covering the topic.* Complete coverage of the 3 categories of disaster: natural hazards, human-caused hazards, and accidental and technical hazards.* Only published source of information on the new BCI standards and government requirements.* Up dated information on recovery from cyber attacks, rioting, protests, product tampering, bombs, explosions, and terrorism.
Publisher: Butterworth-Heinemann
ISBN: 0080553729
Category : Computers
Languages : en
Pages : 481
Book Description
Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Katrina Makes Landfall in the Gulf Coast. Avalanche Buries Highway in Denver. Tornado Touches Down in Georgia. These headlines not only have caught the attention of people around the world, they have had a significant effect on IT professionals as well. As technology continues to become more integral to corporate operations at every level of the organization, the job of IT has expanded to become almost all-encompassing. These days, it's difficult to find corners of a company that technology does not touch. As a result, the need to plan for potential disruptions to technology services has increased exponentially. That is what Business Continuity Planning (BCP) is: a methodology used to create a plan for how an organization will recover after a disaster of various types. It takes into account both security and corporate risk management tatics.There is a lot of movement around this initiative in the industry: the British Standards Institute is releasing a new standard for BCP this year. Trade shows are popping up covering the topic.* Complete coverage of the 3 categories of disaster: natural hazards, human-caused hazards, and accidental and technical hazards.* Only published source of information on the new BCI standards and government requirements.* Up dated information on recovery from cyber attacks, rioting, protests, product tampering, bombs, explosions, and terrorism.
FISMA and the Risk Management Framework
Author: Daniel R. Philpott
Publisher: Newnes
ISBN: 1597496421
Category : Computers
Languages : en
Pages : 585
Book Description
FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security deals with the Federal Information Security Management Act (FISMA), a law that provides the framework for securing information systems and managing risk associated with information resources in federal government agencies. Comprised of 17 chapters, the book explains the FISMA legislation and its provisions, strengths and limitations, as well as the expectations and obligations of federal agencies subject to FISMA. It also discusses the processes and activities necessary to implement effective information security management following the passage of FISMA, and it describes the National Institute of Standards and Technology's Risk Management Framework. The book looks at how information assurance, risk management, and information systems security is practiced in federal government agencies; the three primary documents that make up the security authorization package: system security plan, security assessment report, and plan of action and milestones; and federal information security-management requirements and initiatives not explicitly covered by FISMA. This book will be helpful to security officers, risk managers, system owners, IT managers, contractors, consultants, service providers, and others involved in securing, managing, or overseeing federal information systems, as well as the mission functions and business processes supported by those systems. - Learn how to build a robust, near real-time risk management system and comply with FISMA - Discover the changes to FISMA compliance and beyond - Gain your systems the authorization they need
Publisher: Newnes
ISBN: 1597496421
Category : Computers
Languages : en
Pages : 585
Book Description
FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security deals with the Federal Information Security Management Act (FISMA), a law that provides the framework for securing information systems and managing risk associated with information resources in federal government agencies. Comprised of 17 chapters, the book explains the FISMA legislation and its provisions, strengths and limitations, as well as the expectations and obligations of federal agencies subject to FISMA. It also discusses the processes and activities necessary to implement effective information security management following the passage of FISMA, and it describes the National Institute of Standards and Technology's Risk Management Framework. The book looks at how information assurance, risk management, and information systems security is practiced in federal government agencies; the three primary documents that make up the security authorization package: system security plan, security assessment report, and plan of action and milestones; and federal information security-management requirements and initiatives not explicitly covered by FISMA. This book will be helpful to security officers, risk managers, system owners, IT managers, contractors, consultants, service providers, and others involved in securing, managing, or overseeing federal information systems, as well as the mission functions and business processes supported by those systems. - Learn how to build a robust, near real-time risk management system and comply with FISMA - Discover the changes to FISMA compliance and beyond - Gain your systems the authorization they need
The Owner's Role in Project Risk Management
Author: National Research Council
Publisher: National Academies Press
ISBN: 0309181615
Category : Transportation
Languages : en
Pages : 102
Book Description
Effective risk management is essential for the success of large projects built and operated by the Department of Energy (DOE), particularly for the one-of-a-kind projects that characterize much of its mission. To enhance DOE's risk management efforts, the department asked the NRC to prepare a summary of the most effective practices used by leading owner organizations. The study's primary objective was to provide DOE project managers with a basic understanding of both the project owner's risk management role and effective oversight of those risk management activities delegated to contractors.
Publisher: National Academies Press
ISBN: 0309181615
Category : Transportation
Languages : en
Pages : 102
Book Description
Effective risk management is essential for the success of large projects built and operated by the Department of Energy (DOE), particularly for the one-of-a-kind projects that characterize much of its mission. To enhance DOE's risk management efforts, the department asked the NRC to prepare a summary of the most effective practices used by leading owner organizations. The study's primary objective was to provide DOE project managers with a basic understanding of both the project owner's risk management role and effective oversight of those risk management activities delegated to contractors.
Federal Cloud Computing
Author: Matthew Metheny
Publisher: Newnes
ISBN: 1597497398
Category : Computers
Languages : en
Pages : 461
Book Description
Federal Cloud Computing: The Definitive Guide for Cloud Service Providers offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation. You will learn the basics of the NIST risk management framework (RMF) with a specific focus on cloud computing environments, all aspects of the Federal Risk and Authorization Management Program (FedRAMP) process, and steps for cost-effectively implementing the Assessment and Authorization (A&A) process, as well as strategies for implementing Continuous Monitoring, enabling the Cloud Service Provider to address the FedRAMP requirement on an ongoing basis. - Provides a common understanding of the federal requirements as they apply to cloud computing - Provides a targeted and cost-effective approach for applying the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) - Provides both technical and non-technical perspectives of the Federal Assessment and Authorization (A&A) process that speaks across the organization
Publisher: Newnes
ISBN: 1597497398
Category : Computers
Languages : en
Pages : 461
Book Description
Federal Cloud Computing: The Definitive Guide for Cloud Service Providers offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation. You will learn the basics of the NIST risk management framework (RMF) with a specific focus on cloud computing environments, all aspects of the Federal Risk and Authorization Management Program (FedRAMP) process, and steps for cost-effectively implementing the Assessment and Authorization (A&A) process, as well as strategies for implementing Continuous Monitoring, enabling the Cloud Service Provider to address the FedRAMP requirement on an ongoing basis. - Provides a common understanding of the federal requirements as they apply to cloud computing - Provides a targeted and cost-effective approach for applying the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) - Provides both technical and non-technical perspectives of the Federal Assessment and Authorization (A&A) process that speaks across the organization
Strategic Risk Management
Author: Campbell R. Harvey
Publisher: John Wiley & Sons
ISBN: 1119773911
Category : Business & Economics
Languages : en
Pages : 262
Book Description
STRATEGIC RISK MANAGEMENT Having just experienced a global pandemic that sent equity markets into a tailspin in March 2020, risk management is a more relevant topic than ever. It remains, however, an often poorly understood afterthought. Many portfolios are designed without any thought given to risk management before they are handed off to a dedicated—but separate—risk management team. In Strategic Risk Management: Designing Portfolios and Managing Risk, Campbell R. Harvey, Sandy Rattray, and Otto Van Hemert deliver a reimagining of the risk management process. The book envisions a marriage between the investment and risk processes, an approach that has proven successful at the world’s largest publicly listed hedge fund, Man Group. The authors provide readers with a new framework for portfolio design that includes defensive strategies, drawdown risk controls, volatility targeting, and actively timing rebalancing trades. You will learn about how the book’s new approach to risk management fared during the recent market drawdown at the height of the COVID-19 pandemic. You will also discover why the traditional risk weighting approach only works on certain classes of assets. The book shows you how to accurately evaluate the costs of defensive strategies and which ones offer the best and most cost-effective protection against market downturns. Finally, you will learn how to obtain a more balanced return stream by targeting volatility rather than a constant notional exposure and gain a deeper understanding of concepts like portfolio rebalancing. Perfect for people working in the asset management industry and financial policy makers, Strategic Risk Management: Designing Portfolios and Managing Risk will also earn a place in the libraries of economics and finance scholars, as well as casual readers who take an active approach to investing in their savings or pension assets. PRAISE FOR STRATEGIC RISK MANAGEMENT “Strategic Risk Management shows how to fully embed risk management into the portfolio management process as an equal partner to alpha. This should clearly be best practice for all asset managers.” —Jase Auby, Chief Investment Officer, the Teacher Retirement System of Texas “This book shows the power of integrating risk and investment management, rather than applying risk management as an afterthought to satisfy set limits. I was pleased to shepherd some of the key ideas in this book through the publication process at The Journal of Portfolio Management.” —Frank J. Fabozzi, Editor, The Journal of Portfolio Management “Financial markets today are quite different from those of the last century. Understanding leverage, correlations, tails, and other risk parameters of a portfolio is at least as important as work on signals and alpha. In that sense, bringing risk management from ‘control’ to ‘front office’ should be a priority for asset managers. This book explains how to do it.” —Marko Kolanovic, Chief Global Market Strategist, J.P. Morgan A powerful new approach to risk management in volatile and uncertain markets While the COVID-19 pandemic threw the importance of effective risk management into sharp relief, many investment firms hang on to a traditional and outdated model of risk management. Using siloed and independent portfolio management and risk monitoring teams, these firms miss out on the opportunities presented by integrated risk management. Strategic Risk Management: Designing Portfolios and Managing Risk delivers a fresh approach to risk management in difficult market conditions. The accomplished author team advocates for the amalgamation of portfolio design and risk monitoring teams, incorporating risk management into every aspect of portfolio design. The book provides a roadmap for the crucial aspects of portfolio design, including defensive strategies, drawdown risk controls, volatility targeting, and actively timing rebalancing trades. You will discover how these techniques helped the authors achieve remarkable results during the market drawdown in the midst of the COVID-19 pandemic and how they can help you protect your assets against unpredictable—but inevitable—future bear markets. Ideal for professionals in the asset management industry, Strategic Risk Management: Designing Portfolios and Managing Risk is a valuable resource for financial policy makers, economics and finance scholars, and anyone with even a passing interest in taking an active role in investing for their future.
Publisher: John Wiley & Sons
ISBN: 1119773911
Category : Business & Economics
Languages : en
Pages : 262
Book Description
STRATEGIC RISK MANAGEMENT Having just experienced a global pandemic that sent equity markets into a tailspin in March 2020, risk management is a more relevant topic than ever. It remains, however, an often poorly understood afterthought. Many portfolios are designed without any thought given to risk management before they are handed off to a dedicated—but separate—risk management team. In Strategic Risk Management: Designing Portfolios and Managing Risk, Campbell R. Harvey, Sandy Rattray, and Otto Van Hemert deliver a reimagining of the risk management process. The book envisions a marriage between the investment and risk processes, an approach that has proven successful at the world’s largest publicly listed hedge fund, Man Group. The authors provide readers with a new framework for portfolio design that includes defensive strategies, drawdown risk controls, volatility targeting, and actively timing rebalancing trades. You will learn about how the book’s new approach to risk management fared during the recent market drawdown at the height of the COVID-19 pandemic. You will also discover why the traditional risk weighting approach only works on certain classes of assets. The book shows you how to accurately evaluate the costs of defensive strategies and which ones offer the best and most cost-effective protection against market downturns. Finally, you will learn how to obtain a more balanced return stream by targeting volatility rather than a constant notional exposure and gain a deeper understanding of concepts like portfolio rebalancing. Perfect for people working in the asset management industry and financial policy makers, Strategic Risk Management: Designing Portfolios and Managing Risk will also earn a place in the libraries of economics and finance scholars, as well as casual readers who take an active approach to investing in their savings or pension assets. PRAISE FOR STRATEGIC RISK MANAGEMENT “Strategic Risk Management shows how to fully embed risk management into the portfolio management process as an equal partner to alpha. This should clearly be best practice for all asset managers.” —Jase Auby, Chief Investment Officer, the Teacher Retirement System of Texas “This book shows the power of integrating risk and investment management, rather than applying risk management as an afterthought to satisfy set limits. I was pleased to shepherd some of the key ideas in this book through the publication process at The Journal of Portfolio Management.” —Frank J. Fabozzi, Editor, The Journal of Portfolio Management “Financial markets today are quite different from those of the last century. Understanding leverage, correlations, tails, and other risk parameters of a portfolio is at least as important as work on signals and alpha. In that sense, bringing risk management from ‘control’ to ‘front office’ should be a priority for asset managers. This book explains how to do it.” —Marko Kolanovic, Chief Global Market Strategist, J.P. Morgan A powerful new approach to risk management in volatile and uncertain markets While the COVID-19 pandemic threw the importance of effective risk management into sharp relief, many investment firms hang on to a traditional and outdated model of risk management. Using siloed and independent portfolio management and risk monitoring teams, these firms miss out on the opportunities presented by integrated risk management. Strategic Risk Management: Designing Portfolios and Managing Risk delivers a fresh approach to risk management in difficult market conditions. The accomplished author team advocates for the amalgamation of portfolio design and risk monitoring teams, incorporating risk management into every aspect of portfolio design. The book provides a roadmap for the crucial aspects of portfolio design, including defensive strategies, drawdown risk controls, volatility targeting, and actively timing rebalancing trades. You will discover how these techniques helped the authors achieve remarkable results during the market drawdown in the midst of the COVID-19 pandemic and how they can help you protect your assets against unpredictable—but inevitable—future bear markets. Ideal for professionals in the asset management industry, Strategic Risk Management: Designing Portfolios and Managing Risk is a valuable resource for financial policy makers, economics and finance scholars, and anyone with even a passing interest in taking an active role in investing for their future.
MITRE Systems Engineering Guide
Author:
Publisher:
ISBN: 9780615974422
Category :
Languages : en
Pages :
Book Description
Publisher:
ISBN: 9780615974422
Category :
Languages : en
Pages :
Book Description
Information Security Handbook
Author: Darren Death
Publisher: Packt Publishing Ltd
ISBN: 1788473264
Category : Computers
Languages : en
Pages : 325
Book Description
Implement information security effectively as per your organization's needs. About This Book Learn to build your own information security framework, the best fit for your organization Build on the concepts of threat modeling, incidence response, and security analysis Practical use cases and best practices for information security Who This Book Is For This book is for security analysts and professionals who deal with security mechanisms in an organization. If you are looking for an end to end guide on information security and risk analysis with no prior knowledge of this domain, then this book is for you. What You Will Learn Develop your own information security framework Build your incident response mechanism Discover cloud security considerations Get to know the system development life cycle Get your security operation center up and running Know the various security testing types Balance security as per your business needs Implement information security best practices In Detail Having an information security mechanism is one of the most crucial factors for any organization. Important assets of organization demand a proper risk management and threat model for security, and so information security concepts are gaining a lot of traction. This book starts with the concept of information security and shows you why it's important. It then moves on to modules such as threat modeling, risk management, and mitigation. It also covers the concepts of incident response systems, information rights management, and more. Moving on, it guides you to build your own information security framework as the best fit for your organization. Toward the end, you'll discover some best practices that can be implemented to make your security framework strong. By the end of this book, you will be well-versed with all the factors involved in information security, which will help you build a security framework that is a perfect fit your organization's requirements. Style and approach This book takes a practical approach, walking you through information security fundamentals, along with information security best practices.
Publisher: Packt Publishing Ltd
ISBN: 1788473264
Category : Computers
Languages : en
Pages : 325
Book Description
Implement information security effectively as per your organization's needs. About This Book Learn to build your own information security framework, the best fit for your organization Build on the concepts of threat modeling, incidence response, and security analysis Practical use cases and best practices for information security Who This Book Is For This book is for security analysts and professionals who deal with security mechanisms in an organization. If you are looking for an end to end guide on information security and risk analysis with no prior knowledge of this domain, then this book is for you. What You Will Learn Develop your own information security framework Build your incident response mechanism Discover cloud security considerations Get to know the system development life cycle Get your security operation center up and running Know the various security testing types Balance security as per your business needs Implement information security best practices In Detail Having an information security mechanism is one of the most crucial factors for any organization. Important assets of organization demand a proper risk management and threat model for security, and so information security concepts are gaining a lot of traction. This book starts with the concept of information security and shows you why it's important. It then moves on to modules such as threat modeling, risk management, and mitigation. It also covers the concepts of incident response systems, information rights management, and more. Moving on, it guides you to build your own information security framework as the best fit for your organization. Toward the end, you'll discover some best practices that can be implemented to make your security framework strong. By the end of this book, you will be well-versed with all the factors involved in information security, which will help you build a security framework that is a perfect fit your organization's requirements. Style and approach This book takes a practical approach, walking you through information security fundamentals, along with information security best practices.
Analytical Methods for Risk Management
Author: Paul R. Garvey
Publisher: CRC Press
ISBN: 1420011391
Category : Business & Economics
Languages : en
Pages : 284
Book Description
A Text on the Foundation Processes, Analytical Principles, and Implementation Practices of Engineering Risk Management Drawing from the author's many years of hands-on experience in the field, Analytical Methods for Risk Management: A Systems Engineering Perspectivepresents the foundation processes and analytical practices
Publisher: CRC Press
ISBN: 1420011391
Category : Business & Economics
Languages : en
Pages : 284
Book Description
A Text on the Foundation Processes, Analytical Principles, and Implementation Practices of Engineering Risk Management Drawing from the author's many years of hands-on experience in the field, Analytical Methods for Risk Management: A Systems Engineering Perspectivepresents the foundation processes and analytical practices
Enterprise Security Risk Management
Author: Brian Allen, Esq., CISSP, CISM, CPP, CFE
Publisher: Rothstein Publishing
ISBN: 1944480439
Category : Business & Economics
Languages : en
Pages : 407
Book Description
As a security professional, have you found that you and others in your company do not always define “security” the same way? Perhaps security interests and business interests have become misaligned. Brian Allen and Rachelle Loyear offer a new approach: Enterprise Security Risk Management (ESRM). By viewing security through a risk management lens, ESRM can help make you and your security program successful. In their long-awaited book, based on years of practical experience and research, Brian Allen and Rachelle Loyear show you step-by-step how Enterprise Security Risk Management (ESRM) applies fundamental risk principles to manage all security risks. Whether the risks are informational, cyber, physical security, asset management, or business continuity, all are included in the holistic, all-encompassing ESRM approach which will move you from task-based to risk-based security. How is ESRM familiar? As a security professional, you may already practice some of the components of ESRM. Many of the concepts – such as risk identification, risk transfer and acceptance, crisis management, and incident response – will be well known to you. How is ESRM new? While many of the principles are familiar, the authors have identified few organizations that apply them in the comprehensive, holistic way that ESRM represents – and even fewer that communicate these principles effectively to key decision-makers. How is ESRM practical? ESRM offers you a straightforward, realistic, actionable approach to deal effectively with all the distinct types of security risks facing you as a security practitioner. ESRM is performed in a life cycle of risk management including: Asset assessment and prioritization. Risk assessment and prioritization. Risk treatment (mitigation). Continuous improvement. Throughout Enterprise Security Risk Management: Concepts and Applications, the authors give you the tools and materials that will help you advance you in the security field, no matter if you are a student, a newcomer, or a seasoned professional. Included are realistic case studies, questions to help you assess your own security program, thought-provoking discussion questions, useful figures and tables, and references for your further reading. By redefining how everyone thinks about the role of security in the enterprise, your security organization can focus on working in partnership with business leaders and other key stakeholders to identify and mitigate security risks. As you begin to use ESRM, following the instructions in this book, you will experience greater personal and professional satisfaction as a security professional – and you’ll become a recognized and trusted partner in the business-critical effort of protecting your enterprise and all its assets.
Publisher: Rothstein Publishing
ISBN: 1944480439
Category : Business & Economics
Languages : en
Pages : 407
Book Description
As a security professional, have you found that you and others in your company do not always define “security” the same way? Perhaps security interests and business interests have become misaligned. Brian Allen and Rachelle Loyear offer a new approach: Enterprise Security Risk Management (ESRM). By viewing security through a risk management lens, ESRM can help make you and your security program successful. In their long-awaited book, based on years of practical experience and research, Brian Allen and Rachelle Loyear show you step-by-step how Enterprise Security Risk Management (ESRM) applies fundamental risk principles to manage all security risks. Whether the risks are informational, cyber, physical security, asset management, or business continuity, all are included in the holistic, all-encompassing ESRM approach which will move you from task-based to risk-based security. How is ESRM familiar? As a security professional, you may already practice some of the components of ESRM. Many of the concepts – such as risk identification, risk transfer and acceptance, crisis management, and incident response – will be well known to you. How is ESRM new? While many of the principles are familiar, the authors have identified few organizations that apply them in the comprehensive, holistic way that ESRM represents – and even fewer that communicate these principles effectively to key decision-makers. How is ESRM practical? ESRM offers you a straightforward, realistic, actionable approach to deal effectively with all the distinct types of security risks facing you as a security practitioner. ESRM is performed in a life cycle of risk management including: Asset assessment and prioritization. Risk assessment and prioritization. Risk treatment (mitigation). Continuous improvement. Throughout Enterprise Security Risk Management: Concepts and Applications, the authors give you the tools and materials that will help you advance you in the security field, no matter if you are a student, a newcomer, or a seasoned professional. Included are realistic case studies, questions to help you assess your own security program, thought-provoking discussion questions, useful figures and tables, and references for your further reading. By redefining how everyone thinks about the role of security in the enterprise, your security organization can focus on working in partnership with business leaders and other key stakeholders to identify and mitigate security risks. As you begin to use ESRM, following the instructions in this book, you will experience greater personal and professional satisfaction as a security professional – and you’ll become a recognized and trusted partner in the business-critical effort of protecting your enterprise and all its assets.