Conducted properly, information security risk assessments provide managers with the feedback needed to understand threats to corporate assets, determine vulnerabilities of current controls, and select appropriate safeguar...

Buy Now From Amazon

Conducted properly, information security risk assessments provide managers with the feedback needed to understand threats to corporate assets, determine vulnerabilities of current controls, and select appropriate safeguards. Performed incorrectly, they can provide the false sense of security that allows potential threats to develop into disastrous losses of proprietary information, capital, and corporate value.

Picking up where its bestselling predecessor left off, The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Second Edition gives you detailed instruction on how to conduct a risk assessment effectively and efficiently. Supplying wide-ranging coverage that includes security risk analysis, mitigation, and risk assessment reporting, this updated edition provides the tools needed to solicit and review the scope and rigor of risk assessment proposals with competence and confidence.

Trusted to assess security for leading organizations and government agencies, including the CIA, NSA, and NATO, Douglas Landoll unveils the little-known tips, tricks, and techniques used by savvy security professionals in the field. He details time-tested methods to help you:

  • Better negotiate the scope and rigor of security assessments
  • Effectively interface with security assessment teams
  • Gain an improved understanding of final report recommendations
  • Deliver insightful comments on draft reports

The book includes charts, checklists, and sample reports to help you speed up the data gathering, analysis, and document development process. Walking you through the process of conducting an effective security assessment, it provides the tools and up-to-date understanding you need to select the security measures best suited to your organization.



  • Used Book in Good Condition
  • Used Book in Good Condition

Similar Products

Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data AnalysisSecurity Risk Management: Building an Information Security Risk Management Program from the Ground UpInformation Security Policies, Procedures, and Standards: A Practitioner's ReferenceMeasuring and Managing Information Risk: A FAIR ApproachInformation Security Management Metrics: A Definitive Guide to Effective Security Monitoring and MeasurementHow to Measure Anything in Cybersecurity RiskComputer Security and Penetration TestingInformation Technology Risk Management in Enterprise Environments: A Review of Industry Practices and a Practical Guide to Risk Management Teams