About the Author |
|
ix | |
Acknowledgments |
|
xi | |
Foreword |
|
xiii | |
Introduction |
|
xvii | |
|
|
1 | (30) |
|
Chapter 1 What Is the Problem? |
|
|
3 | (4) |
|
Chapter 2 Why Is It Complicated? |
|
|
7 | (12) |
|
|
7 | (1) |
|
|
8 | (2) |
|
Technology Was Built on Trust |
|
|
10 | (1) |
|
Technology Is an Opportunity for Misuse |
|
|
10 | (1) |
|
The Fundamental Risk Is Not Always Understood |
|
|
11 | (1) |
|
... And Business Leaders Need to Know What to Do |
|
|
12 | (7) |
|
Lack of a Common Cybersecurity Risk Language |
|
|
13 | (2) |
|
Unclear Answers for Proper Oversight |
|
|
15 | (1) |
|
Oh, and Umm... Distractors |
|
|
16 | (3) |
|
Chapter 3 How to Address This Problem |
|
|
19 | (12) |
|
|
19 | (4) |
|
|
23 | (2) |
|
Measure the Impact of Risk Management |
|
|
25 | (6) |
|
Choose Risk-Informative Measures |
|
|
26 | (1) |
|
Apply Appropriate Resources |
|
|
27 | (1) |
|
|
27 | (1) |
|
Be Clear on What to Measure |
|
|
28 | (1) |
|
Avoid Chasing "Perfect" (It's Not That Valuable) |
|
|
29 | (2) |
|
|
31 | (166) |
|
Chapter 4 Understanding the Problem |
|
|
33 | (48) |
|
|
34 | (1) |
|
Be Clear About the Problem (Critical Assets Are at Risk) |
|
|
35 | (1) |
|
Settle on a Definition of Risk |
|
|
36 | (2) |
|
Settle on a Definition of Critical |
|
|
38 | (4) |
|
Inventory and Categorize Critical Assets |
|
|
42 | (8) |
|
Step 1 Acknowledge That Asset Management Is Hard |
|
|
44 | (1) |
|
Step 2 Develop the Business Case |
|
|
45 | (2) |
|
Step 3 Define Your Asset Classes |
|
|
47 | (1) |
|
Step 4 Collect and Inventory in Each New Asset Class |
|
|
48 | (1) |
|
Step 5 Identify the Most Critical Assets |
|
|
49 | (1) |
|
Identify the Risks to These Critical Assets |
|
|
50 | (13) |
|
Step 5a Perform a Threat Analysis |
|
|
51 | (3) |
|
Step 5b Discover Vulnerabilities |
|
|
54 | (3) |
|
Step 5c Anticipate the Business Impact of an Event |
|
|
57 | (4) |
|
Step 5e Know the Applicable Laws and Regulations |
|
|
61 | (2) |
|
Understanding the Problem: A Recap |
|
|
63 | (1) |
|
|
64 | (14) |
|
Example 1 Getting Started with a Program |
|
|
64 | (6) |
|
Example 2 From Legacy "Perfection" to "Good Enough" |
|
|
70 | (4) |
|
Example 3 Data Protection Strategy, Please |
|
|
74 | (3) |
|
|
77 | (1) |
|
|
78 | (3) |
|
Chapter 5 Manage the Problem |
|
|
81 | (52) |
|
General Observations and Guidelines for Managing the Risk |
|
|
83 | (3) |
|
|
83 | (1) |
|
|
84 | (2) |
|
|
86 | (1) |
|
|
86 | (5) |
|
Structure the Program Approach |
|
|
91 | (24) |
|
|
93 | (2) |
|
Step 2 Align the Risk Mitigating Activities |
|
|
95 | (2) |
|
Step 3 Assign Roles and Responsibilities |
|
|
97 | (2) |
|
Step 4 Identify Gaps and the Appropriate Activities to Fill Them |
|
|
99 | (3) |
|
Step 5 Look Externally (Third-party Risk Management) |
|
|
102 | (3) |
|
Step 5a Split the Questionnaire into Logical Columns |
|
|
105 | (1) |
|
Step 5b Build Each Column upon the One Before |
|
|
105 | (1) |
|
Step 5c Directly Relate the Question to the Risk |
|
|
105 | (7) |
|
Step 6 Pick the Right Tools and Avoid Distraction |
|
|
112 | (3) |
|
Set a Program Review Frequency |
|
|
115 | (2) |
|
Prepare to Respond and Recover |
|
|
117 | (1) |
|
Managing the Problem, a Recap |
|
|
118 | (1) |
|
|
118 | (12) |
|
Example 1 Addressing Too Many Frameworks |
|
|
118 | (4) |
|
Example 2 Many TPRM Tools |
|
|
122 | (3) |
|
Example 3 From Controls Focus to a Risk Strategy |
|
|
125 | (3) |
|
Example 4 Third-Party Without a Checklist |
|
|
128 | (2) |
|
|
130 | (3) |
|
Chapter 6 Get Ready for Measures |
|
|
133 | (4) |
|
Chapter 7 Measure the Problem |
|
|
137 | (28) |
|
|
138 | (1) |
|
Choose Informative Measures That Provide Actionable Values |
|
|
139 | (5) |
|
Step 1 Choose Actionable Measures |
|
|
141 | (1) |
|
Step 2 Define Clear Addressable Activities |
|
|
142 | (1) |
|
Step 3 Provide Actionable Reviews |
|
|
143 | (1) |
|
Research What Others Have Done (Measures That Have Worked) |
|
|
144 | (2) |
|
|
145 | (1) |
|
|
146 | (3) |
|
|
146 | (1) |
|
|
147 | (2) |
|
Gain Buy-In from Stakeholders |
|
|
149 | (2) |
|
Develop a Reporting Structure for Consistency |
|
|
151 | (1) |
|
Allow Measures to Mature Over Time |
|
|
152 | (3) |
|
|
155 | (8) |
|
Example 1 Simple Measures Anyone? |
|
|
155 | (5) |
|
Example 2 Too Much Data, Not Enough Information |
|
|
160 | (3) |
|
|
163 | (2) |
|
|
165 | (8) |
|
|
166 | (1) |
|
Choose a Consistent Report Structure |
|
|
167 | (2) |
|
Provide Clear and Informative Measures |
|
|
169 | (2) |
|
Use Straightforward Terms |
|
|
171 | (1) |
|
Provide Recommendations for All Problems |
|
|
171 | (1) |
|
|
171 | (2) |
|
Chapter 9 Questions Boards Should Ask |
|
|
173 | (10) |
|
|
179 | (4) |
|
|
183 | (14) |
|
First, Understand the Risk |
|
|
183 | (6) |
|
|
189 | (3) |
|
|
192 | (4) |
|
|
196 | (1) |
|
|
197 | (8) |
|
|
197 | (1) |
|
|
198 | (1) |
|
Step 2 Align the Risk-Mitigating Activities |
|
|
199 | (2) |
|
Step 3 Assign Roles and Responsibilities |
|
|
201 | (2) |
|
Step 4 Identify Gaps (Including Third Parties) and the Appropriate Activities to Fill Them |
|
|
203 | (1) |
|
Step 5 Set the Action Plan |
|
|
204 | (1) |
Index |
|
205 | |