|
|
|
|
|
|
|
Chapter 1: Power to the people. |
|
|
|
The power is out there - somewhere. |
|
|
|
An information rich world. |
|
|
|
When in doubt, phone a friend. |
|
|
|
|
|
The power of the blogosphere. |
|
|
|
|
|
|
|
Changing the way we live. |
|
|
|
Transforming the political landscape. |
|
|
|
Network effects in business. |
|
|
|
|
|
Value in the digital age. |
|
|
|
Hidden value in networks. |
|
|
|
Network innovations create security challenges. |
|
|
|
Youa??ve been de-perimeterized! |
|
|
|
The collapse of information management. |
|
|
|
The shifting focus of information security. |
|
|
|
The external perspective. |
|
|
|
|
|
A new age of collaborative working. |
|
|
|
Collaboration oriented architecture. |
|
|
|
Business in virtual worlds. |
|
|
|
Democracy-but not as we know it. |
|
|
|
Dona??t lock down that network. |
|
|
|
The future of network security. |
|
|
|
|
|
The art of disinformation. |
|
|
|
|
|
The next big security concern. |
|
|
|
|
|
Chapter 2: Everyone makes a difference. |
|
|
|
Where to focus your efforts. |
|
|
|
The view from the bridge. |
|
|
|
The role of the executive board. |
|
|
|
The new threat of data leakage. |
|
|
|
The perspective of business management. |
|
|
|
The role of the business manager. |
|
|
|
Engaging with business managers. |
|
|
|
The role of the IT function. |
|
|
|
|
|
|
|
|
|
Learning from stakeholders. |
|
|
|
Chapter 3: Therea??s no such thing as an isolated incident. |
|
|
|
|
|
Accidents waiting to happen. |
|
|
|
|
|
|
|
A lesson from the safety field. |
|
|
|
|
|
The science of error prevention. |
|
|
|
Swiss cheese and security. |
|
|
|
How significant was that event? |
|
|
|
Events are for the record. |
|
|
|
When an event becomes an incident. |
|
|
|
The immediacy of emergencies. |
|
|
|
|
|
When events spiral out of control. |
|
|
|
How the response process changes. |
|
|
|
No two crises are the same. |
|
|
|
One size doesna??t fit all. |
|
|
|
|
|
Some assets are irreplaceable. |
|
|
|
Ita??s the process, not the plan. |
|
|
|
Why crisis management is hard. |
|
|
|
Skills to manage a crisis. |
|
|
|
|
|
The missing piece of the jigsaw. |
|
|
|
Establish the real cause. |
|
|
|
Are you incubating a crisis? |
|
|
|
When crisis management becomes the problem. |
|
|
|
Developing crisis strategy. |
|
|
|
Turning threats into opportunities. |
|
|
|
Boosting market capitalization. |
|
|
|
|
|
Anticipating opportunities. |
|
|
|
Designing crisis team structures. |
|
|
|
|
|
|
|
|
|
|
|
|
|
The challenge of the virtual environment. |
|
|
|
Protocols for virtual team working. |
|
|
|
Exercising the crisis team. |
|
|
|
|
|
Chapter 4: Zen and the art of risk management. |
|
|
|
|
|
|
|
Who invented risk management? |
|
|
|
|
|
|
|
|
|
Dona??t lose sight of business. |
|
|
|
How big is your appetite? |
|
|
|
Ita??s an emotional thing. |
|
|
|
In the eye of the beholder. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Some facts are counter-intuitive. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Something wicked this way comes. |
|
|
|
|
|
|
|
|
|
Lessons from the process industries. |
|
|
|
Lessons from cost engineering. |
|
|
|
Lessons from the financial sector. |
|
|
|
Lessons from the insurance field. |
|
|
|
The limits of percentage play. |
|
|
|
|
|
Joining up risk management. |
|
|
|
|
|
Identifying and ranking risks. |
|
|
|
|
|
|
|
|
|
Comparing and ranking risks. |
|
|
|
Risk management strategies. |
|
|
|
Communicating risk appetite. |
|
|
|
Risk management maturity. |
|
|
|
Therea??s more to security than risk. |
|
|
|
Ita??s a decision support tool. |
|
|
|
The perils of risk assessment. |
|
|
|
Learning from risk management. |
|
|
|
Chapter 5: Who can you trust? |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
The unfashionable hacker. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Reading between the lines. |
|
|
|
|
|
|
|
|
|
|
|
Cyberspace is less risky. |
|
|
|
|
|
Ita??s a glamor profession. |
|
|
|
|
|
I just dona??t believe it. |
|
|
|
Dona??t lose that evidence. |
|
|
|
|
|
The science of investigation. |
|
|
|
The art of interrogation. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Chapter 6: Managing organization culture and politics. |
|
|
|
|
|
What is organization culture? |
|
|
|
Organizations are different. |
|
|
|
|
|
|
|
|
|
In search of professionalism. |
|
|
|
|
|
Skills for information security. |
|
|
|
|
|
|
|
Navigating the political minefield. |
|
|
|
Square pegs and round holes. |
|
|
|
|
|
|
|
|
|
|
|
In search of a healthy security culture. |
|
|
|
In search of a security mindset. |
|
|
|
Who influences decisions? |
|
|
|
|
|
Dona??t take yes for an answer. |
|
|
|
Learning from organization culture and politics. |
|
|
|
Chapter 7: Designing effective awareness programs. |
|
|
|
|
|
Understanding the problem. |
|
|
|
Asking the right questions. |
|
|
|
The art of questionnaire design. |
|
|
|
|
|
|
|
Adapting to the audience. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Using professional support. |
|
|
|
The art of technical writing. |
|
|
|
|
|
|
|
|
|
The power of the external perspective. |
|
|
|
|
|
Behavioral psychologists. |
|
|
|
|
|
|
|
Learning to conduct campaigns. |
|
|
|
Chapter 8: Transforming organization attitudes and behavior. |
|
|
|
|
|
|
|
|
|
|
|
Successful uses of scenarios. |
|
|
|
Dangers of scenario planning. |
|
|
|
|
|
|
|
The balance of consequences. |
|
|
|
The power of attribution. |
|
|
|
Environments shape behavior. |
|
|
|
Enforcing the rules of the network. |
|
|
|
Encouraging business ethics. |
|
|
|
The art of online persuasion. |
|
|
|
Learning to change behavior. |
|
|
|
Chapter 9: Gaining executive board and business buy-in. |
|
|
|
Countering security fatigue. |
|
|
|
Money isna??t everything. |
|
|
|
What makes a good business case? |
|
|
|
Aligning with investment appraisal criteria. |
|
|
|
Translating benefits into financial terms. |
|
|
|
Aligning with IT strategy. |
|
|
|
Achieving a decisive result. |
|
|
|
Key elements of a good business case. |
|
|
|
Assembling the business case. |
|
|
|
Identifying and assessing benefits. |
|
|
|
|
|
|
|
Framing your recommendations. |
|
|
|
|
|
Learning how to make the business case. |
|
|
|
Chapter 10: Designing security systems that work. |
|
|
|
|
|
|
|
What makes a good vision? |
|
|
|
|
|
|
|
Critical success factors for effective governance. |
|
|
|
The smart approach to governance. |
|
|
|
Dona??t reinvent the wheel. |
|
|
|
Look for precedents from other fields. |
|
|
|
Take a top down approach. |
|
|
|
Start small, then extend. |
|
|
|
Take a strategic approach. |
|
|
|
|
|
Identify and assess options. |
|
|
|
Risk assessment or prescriptive controls? |
|
|
|
|
|
Not all labels are the same. |
|
|
|
Guidance for technology and people. |
|
|
|
Designing long-lasting frameworks. |
|
|
|
Applying the fourth dimension. |
|
|
|
|
|
|
|
|
|
Managing risks across outsourced supply chains. |
|
|
|
Models, frameworks and architectures. |
|
|
|
Why we need architecture. |
|
|
|
The folly of enterprise security architectures. |
|
|
|
Real-world security architecture. |
|
|
|
|
|
|
|
|
|
|
|
Jericho Forum principles. |
|
|
|
Collaboration oriented architecture. |
|
|
|
|
|
Capability maturity models. |
|
|
|
|
|
|
|
The importance of ergonomics. |
|
|
|
Ita??s more than ease of use. |
|
|
|
|
|
|
|
A nudge in the right direction. |
|
|
|
Learning to design systems that work. |
|
|
|
Chapter 11: Harnessing the power of the organization. |
|
|
|
|
|
Surviving in a hostile world. |
|
|
|
Mobilizing the workforce. |
|
|
|
Work smarter, not harder. |
|
|
|
|
|
The art of systems thinking. |
|
|
|
Creating virtuous circles. |
|
|
|
Triggering a tipping point. |
|
|
|
Identifying key influencers. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Unlimited resources - the power of open source. |
|
|
|
Unlimited purchasing power. |
|
|
|
Let the network to do the work. |
|
|
|
Why is everything getting more complex? |
|
|
|
Getting to grips with complexity. |
|
|
|
Simple cana??t control complex. |
|
|
|
|
|
|
|
The power of expressive systems. |
|
|
|
|
|
Why innovation is important. |
|
|
|
|
|
What inspires people to create? |
|
|
|
|
|
The art of creative thinking. |
|
|
|
|
|
|
|
|
|
Turning ideas into action. |
|
|
|
Steps to innovation heaven. |
|
|
|
|
|
|
|
Learning to harness the power of the organization. |
|
|
|
|