The book explains how to choose and design effective measurement strategies and addresses the data requirements of those strategies. In support of this obligation, security, as a member of the merger or acquisition team, helps the team make informed decisions and execute a. Analysis, visualization, and dashboards by jay jacobs and bob rudis. The role of information security in a mergeracquisition. Mergers and acquisitions news and articles infosecurity. Products purchased from third party sellers are not guaranteed by the publisher for quality. Towards a security cost model for cyberphysical systems arxiv. Effective information security depends on strategic security metrics article pdf available january 2007 with 2,616 reads how we measure reads. Hayden goes into significant detail on the nature of data, statistics, and analysis. My expectations were not terribly high as ive found most other metrics materials quickly. Optiv security officially launches as security solutions powerhouse. This indicates that the area of information security metrics is immature in the participating.
Pdf information security professionals are faced with increasing compliance obligations associated with laws. Not, at least, if you understand the key elements that drive risk into an organization. Keep uptodate with the latest mergers and acquisitions trends through news, opinion and educational content from infosecurity magazine. Online services and the analysis of competitive merger. This paper presents a model of competition in privacy andor quality offered to consumers in twosided online markets in which revenue is. Lance hayden, the chief privacy and security officer for epatientfinder, is also. Your enterprise security culture and it security metrics. Even though this last definition does not use the word metric they are still. Implement an effective security metrics project or program. Introducing security metrics 1 what is a security metric. The opinions expressed in this blog are those of lance hayden and do not. Lance hayden s it security metrics is one of those. Pdf automated security metrics in ismss to discover the. Ive been running a security program for over 10 years and once in a while a book or reference comes along that truly helps me in my work.
Jay jacobs offers his take on data collection and incident reporting with the veris. Automated security metrics in ismss to discover the level of security of oss and dbmss conference paper pdf available june 2011 with 60 reads how we measure reads. Accuvant and fishnet announced at black hat 2015 that the. Accuvant and fishnet security complete merger business wire. Meanwhile, there are other approaches to security metrics, including books such as it security metrics by lance hayden and security metrics. It security metrics provides a comprehensive approach to measuring risks, threats, operational activities, and the effectiveness of data protection in your organization. This section from chapter explores information security metrics. For the data geeks in the crowd, we also really like another book entitled datadriven security.
1330 1109 521 1349 523 197 1423 1160 1367 448 1045 1603 1125 1074 1151 968 362 584 1078 113 401 890 293 979 1084 341 1480 582 362 387 897 498 1234 1298 1113 1398 866 636 1036 489 1250