Information Security Risk Management for ISO 27001/ISO 27002, third edition  
Published by IT Governance Publishing
Publication Date:  Available in all formats
ISBN: 9781787781382
Pages: 0

PAPERBACK

EBOOK (EPUB)

EBOOK (PDF)

ISBN: 9781787781368 Price: INR 3144.75
Add to cart Buy Now
Protect your information assets with effective risk management In today’s information economy, the development, exploitation and protection of information and associated assets are key to the long-term competitiveness and survival of corporations and entire economies. The protection of information and associated assets – information security – is therefore overtaking physical asset protection as a fundamental corporate governance responsibility.  Information security management system requirements ISO 27000, which provides an overview for the family of international standards for information security, states that “An organisation needs to undertake the following steps in establishing, monitoring, maintaining and improving its ISMS […] assess information security risks and treat information security risks”. The requirements for an ISMS are specified in ISO 27001. Under this standard, a risk assessment must be carried out to inform the selection of security controls, making risk assessment the core competence of information security management and a critical corporate discipline. Plan and carry out a risk assessment to protect your information Information Security Risk Management for ISO 27001 / ISO 27002: Provides information security and risk management teams with detailed, practical guidance on how to develop and implement a risk assessment in line with the requirements of ISO 27001. Draws on national and international best practice around risk assessment, including BS 7799-3:2017 (BS 7799-3). Covers key topics such as risk assessment methodologies, risk management objectives, information security policy and scoping, threats and vulnerabilities, risk treatment and selection of controls. Includes advice on choosing risk assessment software. Ideal for risk managers, information security managers, lead implementers, compliance managers and consultants, as well as providing useful background material for auditors, this book will enable readers to develop an ISO 27001-compliant risk assessment framework for their organisation and deliver real, bottom-line business benefits. Buy your copy today! About the authors Alan Calder is the Group CEO of GRC International Group plc, the AIM-listed company that owns IT Governance Ltd. Alan is an acknowledged international cyber security guru and a leading author on information security and IT governance issues. He has been involved in the development of a wide range of information security management training courses that have been accredited by IBITGQ (International Board for IT Governance Qualifications). Alan has consulted for clients in the UK and abroad, and is a regular media commentator and speaker.  Steve Watkins is an executive director at GRC International Group plc. He is a contracted technical assessor for UKAS – advising on its assessments of certification bodies offering ISMS/ISO 27001 and ITSMS/ISO 20000-1 accredited certification. He is a member of ISO/IEC JTC 1/SC 27, the international technical committee responsible for information security, cyber security and privacy standards, and chairs the UK National Standards Body’s technical committee IST/33 (information security, cyber security and privacy protection) that mirrors it. Steve was an active member of IST/33/-/6, which developed BS 7799-3. 
Rating
Description
Protect your information assets with effective risk management In today’s information economy, the development, exploitation and protection of information and associated assets are key to the long-term competitiveness and survival of corporations and entire economies. The protection of information and associated assets – information security – is therefore overtaking physical asset protection as a fundamental corporate governance responsibility.  Information security management system requirements ISO 27000, which provides an overview for the family of international standards for information security, states that “An organisation needs to undertake the following steps in establishing, monitoring, maintaining and improving its ISMS […] assess information security risks and treat information security risks”. The requirements for an ISMS are specified in ISO 27001. Under this standard, a risk assessment must be carried out to inform the selection of security controls, making risk assessment the core competence of information security management and a critical corporate discipline. Plan and carry out a risk assessment to protect your information Information Security Risk Management for ISO 27001 / ISO 27002: Provides information security and risk management teams with detailed, practical guidance on how to develop and implement a risk assessment in line with the requirements of ISO 27001. Draws on national and international best practice around risk assessment, including BS 7799-3:2017 (BS 7799-3). Covers key topics such as risk assessment methodologies, risk management objectives, information security policy and scoping, threats and vulnerabilities, risk treatment and selection of controls. Includes advice on choosing risk assessment software. Ideal for risk managers, information security managers, lead implementers, compliance managers and consultants, as well as providing useful background material for auditors, this book will enable readers to develop an ISO 27001-compliant risk assessment framework for their organisation and deliver real, bottom-line business benefits. Buy your copy today! About the authors Alan Calder is the Group CEO of GRC International Group plc, the AIM-listed company that owns IT Governance Ltd. Alan is an acknowledged international cyber security guru and a leading author on information security and IT governance issues. He has been involved in the development of a wide range of information security management training courses that have been accredited by IBITGQ (International Board for IT Governance Qualifications). Alan has consulted for clients in the UK and abroad, and is a regular media commentator and speaker.  Steve Watkins is an executive director at GRC International Group plc. He is a contracted technical assessor for UKAS – advising on its assessments of certification bodies offering ISMS/ISO 27001 and ITSMS/ISO 20000-1 accredited certification. He is a member of ISO/IEC JTC 1/SC 27, the international technical committee responsible for information security, cyber security and privacy standards, and chairs the UK National Standards Body’s technical committee IST/33 (information security, cyber security and privacy protection) that mirrors it. Steve was an active member of IST/33/-/6, which developed BS 7799-3. 
Table of contents
  • Cover
  • Title
  • Copyright
  • About the Author
  • Contents
  • Introduction
  • Chapter 1: Risk management
    • Risk management: two phases
    • Enterprise risk management
  • Chapter 2: Risk assessment methodologies
    • Publicly available risk assessment standards
    • Qualitative versus quantitative
    • Quantitative risk analysis
    • Qualitative risk analysis
  • Chapter 3: Risk management objectives
    • Risk acceptance or tolerance
    • Information security risk management objectives
    • Risk management and process models
  • Chapter 4: Roles and responsibilities
    • Senior management commitment
    • The (lead) risk assessor
    • Other roles and responsibilities
  • Chapter 5: Risk assessment software
    • Gap analysis tools
    • Vulnerability assessment tools
    • Penetration testing
    • Risk assessment tools
    • Risk assessment tool descriptions
  • Chapter 6: Information security policy and scoping
    • Information security policy
    • Scope of the ISMS
  • Chapter 7: The ISO 27001 risk assessment
    • Overview of the risk assessment process
  • Chapter 8: Information assets
    • Assets within the scope
    • Grouping of assets
    • Asset dependencies
    • Asset owners
    • Sensitivity classification
    • Are vendors assets?
    • What about duplicate copies and backups?
    • Identification of existing controls
  • Chapter 9: Threats and vulnerabilities
    • Threats
    • Vulnerabilities
    • Technical vulnerabilities
  • Chapter 10: Scenario-based risk assessment
  • Chapter 11: Impact, including asset valuation
    • Impacts
    • Defining impact
    • Estimating impact
    • The asset valuation table
    • Business, legal and contractual impact values
    • Reputational damage
  • Chapter 12: Likelihood
    • Risk analysis
    • Information to support assessments
  • Chapter 13: Risk level
    • The risk scale
    • Boundary calculations
    • Mid-point calculations
  • Chapter 14: Risk treatment and the selection of controls
    • Types of controls
    • Risk assessment and existing controls
    • Residual risk
    • Risk sharing
    • Optimising the solution
  • Chapter 15: The Statement of Applicability
    • Drafting the Statement of Applicability
  • Chapter 16: The gap analysis and risk treatment plan
    • Gap analysis
    • Risk treatment plan
  • Chapter 17: Repeating and reviewing the risk assessment
  • Appendix 1: vsRisk Cloud
  • Appendix 2: ISO 27001 implementation resources
  • Appendix 3: Books by the same authors
  • Further reading
User Reviews
Rating