Acknowledgments |
|
xv | |
Introduction |
|
xvii | |
|
|
1 | (20) |
|
Organizational Governance |
|
|
2 | (8) |
|
Organizational Strategy, Goals, and Objectives |
|
|
2 | (1) |
|
Organizational Structure, Roles, and Responsibilities |
|
|
3 | (1) |
|
|
4 | (1) |
|
|
5 | (1) |
|
|
5 | (1) |
|
|
6 | (4) |
|
|
10 | (5) |
|
Enterprise Risk Management and Risk Management Frameworks |
|
|
10 | (2) |
|
|
12 | (1) |
|
|
13 | (1) |
|
Risk Appetite and Risk Tolerance |
|
|
13 | (1) |
|
Legal, Regulatory, and Contractual Requirements |
|
|
14 | (1) |
|
Professional Ethics of Risk Management |
|
|
15 | (1) |
|
|
15 | (6) |
|
|
16 | (1) |
|
|
17 | (3) |
|
|
20 | (1) |
|
Chapter 2 IT Risk Assessment |
|
|
21 | (60) |
|
|
22 | (18) |
|
|
25 | (3) |
|
Threat Modeling and Threat Landscape |
|
|
28 | (2) |
|
Vulnerability and Control Deficiency Analysis |
|
|
30 | (8) |
|
Risk Scenario Development |
|
|
38 | (2) |
|
IT Risk Analysis and Evaluation |
|
|
40 | (33) |
|
Risk Assessment Concepts, Standards, and Frameworks |
|
|
40 | (5) |
|
Risk Assessment Standards and Frameworks |
|
|
45 | (6) |
|
|
51 | (1) |
|
|
51 | (1) |
|
|
52 | (4) |
|
Risk Analysis Methodologies |
|
|
56 | (10) |
|
|
66 | (5) |
|
Inherent and Residual Risk |
|
|
71 | (1) |
|
Miscellaneous Risk Considerations |
|
|
72 | (1) |
|
|
73 | (8) |
|
|
75 | (1) |
|
|
75 | (3) |
|
|
78 | (3) |
|
Chapter 3 Risk Response and Reporting |
|
|
81 | (46) |
|
|
82 | (11) |
|
Risk and Control Ownership |
|
|
82 | (1) |
|
Risk Treatment/Risk Response Options |
|
|
83 | (3) |
|
|
86 | (3) |
|
Issues, Findings, and Exceptions Management |
|
|
89 | (1) |
|
Management of Emerging Risk |
|
|
90 | (3) |
|
Control Design and Implementation |
|
|
93 | (13) |
|
Control Types and Functions |
|
|
93 | (3) |
|
Control Standards and Frameworks |
|
|
96 | (5) |
|
Control Design, Selection, and Analysis |
|
|
101 | (3) |
|
|
104 | (2) |
|
Control Testing and Effectiveness Evaluation |
|
|
106 | (1) |
|
Risk Monitoring and Reporting |
|
|
106 | (8) |
|
|
108 | (1) |
|
Data Collection, Aggregation, Analysis, and Validation |
|
|
108 | (1) |
|
Risk and Control Monitoring Techniques |
|
|
109 | (1) |
|
Risk and Control Reporting Techniques |
|
|
109 | (1) |
|
Key Performance Indicators |
|
|
110 | (2) |
|
|
112 | (1) |
|
|
113 | (1) |
|
|
114 | (13) |
|
|
116 | (3) |
|
|
119 | (4) |
|
|
123 | (4) |
|
Chapter 4 Information Technology and Security |
|
|
127 | (56) |
|
|
128 | (7) |
|
|
129 | (1) |
|
|
129 | (1) |
|
|
130 | (1) |
|
|
130 | (1) |
|
|
130 | (1) |
|
|
131 | (1) |
|
|
132 | (1) |
|
Enterprise Architecture Frameworks |
|
|
132 | (3) |
|
Implementing a Security Architecture |
|
|
135 | (1) |
|
|
135 | (2) |
|
|
137 | (3) |
|
Business Continuity and Disaster Recovery Management |
|
|
140 | (4) |
|
|
141 | (1) |
|
|
141 | (1) |
|
|
141 | (1) |
|
|
142 | (1) |
|
Resilience and Risk Factors |
|
|
142 | (2) |
|
Data Lifecycle Management |
|
|
144 | (3) |
|
|
145 | (1) |
|
|
146 | (1) |
|
Hardware Disposal and Data Destruction Policies |
|
|
147 | (1) |
|
Systems Development Life Cycle |
|
|
147 | (5) |
|
|
149 | (1) |
|
|
149 | (1) |
|
|
149 | (1) |
|
|
150 | (1) |
|
|
150 | (1) |
|
Implementation and Operation |
|
|
150 | (1) |
|
|
151 | (1) |
|
|
151 | (1) |
|
|
152 | (2) |
|
Information Security Concepts, Frameworks, and Standards |
|
|
154 | (11) |
|
Confidentiality, Integrity, and Availability |
|
|
154 | (1) |
|
|
155 | (1) |
|
Data Sensitivity and Classification |
|
|
156 | (1) |
|
Identification and Authentication |
|
|
157 | (1) |
|
|
157 | (1) |
|
|
158 | (1) |
|
|
158 | (1) |
|
Frameworks, Standards, and Practices |
|
|
159 | (1) |
|
NIST Risk Management Framework |
|
|
160 | (2) |
|
ISO 27001/27002/27701/31000 |
|
|
162 | (1) |
|
|
162 | (2) |
|
The Risk IT Framework (ISACA) |
|
|
164 | (1) |
|
Security and Risk Awareness Training Programs |
|
|
165 | (2) |
|
Awareness Tools and Techniques |
|
|
165 | (1) |
|
Developing Organizational Security and Risk Awareness Programs |
|
|
166 | (1) |
|
Data Privacy and Data Protection Principles |
|
|
167 | (8) |
|
|
167 | (1) |
|
|
167 | (1) |
|
|
168 | (1) |
|
|
168 | (5) |
|
|
173 | (2) |
|
|
175 | (8) |
|
|
177 | (1) |
|
|
178 | (3) |
|
|
181 | (2) |
|
Appendix A Implementing and Managing a Risk Management Program |
|
|
183 | (22) |
|
|
183 | (3) |
|
What Is a Risk Management Program? |
|
|
186 | (2) |
|
The Purpose of a Risk Management Program |
|
|
187 | (1) |
|
The Risk Management Life Cycle |
|
|
188 | (17) |
|
|
188 | (5) |
|
|
193 | (1) |
|
Reviewing the Risk Register |
|
|
194 | (2) |
|
Performing Deeper Analysis |
|
|
196 | (3) |
|
Developing a Risk Treatment Recommendation |
|
|
199 | (4) |
|
|
203 | (2) |
|
Appendix B About the Online Content |
|
|
205 | (4) |
|
|
205 | (1) |
|
Your Total Seminars Training Hub Account |
|
|
205 | (1) |
|
|
205 | (1) |
|
Single User License Terms and Conditions |
|
|
205 | (2) |
|
|
207 | (1) |
|
|
207 | (2) |
Glossary |
|
209 | (12) |
Index |
|
221 | |