Copyright © Ellen Dutton All Rights Reserved Webpage developed, hosted and secured by Alan Scholl email@alanscholl.com.
 Ellen Dutton, CISSP March 20, 2020 Risk-based Security Review
A Security Review how-to handbook in 70 pages
Read this Book to earn 5 CISSP CPEs
About the Book
Risk-based Security Review
 Security Review is complicated. Done well it assures us that the systems we use and the vendors we choose are capable of protecting our valuable information. Not done well, it can result in poorly protected systems where cyberattacks are likely to result in tampering, theft, or unauthorized disclosure of data causing loss of private information, trade secrets, and customer data. This can be very expensive in terms of reputational damage, out of pocket costs of remediation, data breach notification and credit protection for data breach victims and fines for failure to protect private information. The mission of this book is to provide the basics of risk-based security review. To explain the process and steps to take, the information needed, what should be considered, documentation to gather, questions to ask, and how to assess the answers and other information. And finally, how to determine the risk of using a system, and how to complete the Security Review to ensure the best, most secure outcome for your organization. Some timely topics covered in this book: While gathering the CPEs for her CISSP credential renewal Ellen looked for a series of short books targeting different facets of the work she does daily, so she could quickly build her knowledge base and gain 5 CPEs at the same time. This book is the first in what may be a series of short (50-70 page) books on timely cybersecurity topics for practitioners. Please share your thoughts and suggestions with Ellen at: o Seven Security Essentials o When Do You Need A Security Review? o Raising the Bar on Cybersecurity with Risk-based Security Review o The Process of Security Review o Eleven Steps in Security Review o Identifying Security Gaps o Factoring in the Risk
About the Author
Conducting Security Reviews since her first book LAN Security Handbook was published in 1994.
Ellen Dutton, CISSP Ellen Dutton has done security review, information risk management and security architecture in investment banking, pharmaceutical, healthcare, energy and government, and contributed heavily to Congressional briefings on computer security. Ellen wrote CISSP 2019 exam questions at the invitation of (ISC)2.
System design, development, programming, product development and project management was her focus before the emergence of local area networks and the Internet put our precious information resources at risk. Ellen is delighted to hear from other cybersecurity practitioners about their challenges, concerns and triumphs. Her email is:
What would you like to do next? Buy the eBook on Amazon: Purchase the paperback book: coming soon … Security Review question sample: Buy the full Security Review Interactive Questionnaire: coming soon ... Bookmark and watch this space for related books and materials: Https://Risk-basedSecurityReview.com

Copyright © Ellen Dutton All Rights Reserved

 

Webpage developed, hosted and secured by Alan Scholl  email@alanscholl.com.

Risk-based Security Review
 Ellen Dutton, CISSP March 20, 2020
A Security Review how-to handbook in 70 pages
Read this Book to earn 5 CISSP CPEs
About the Book
Risk-based Security Review  Security Review is complicated. Done well it assures us that the systems we use and the vendors we choose are capable of protecting our valuable information. Not done well, it can result in poorly protected systems where cyberattacks are likely to result in tampering, theft, or unauthorized disclosure of data causing loss of private information, trade secrets, and customer data. This can be very expensive in terms of reputational damage, out of pocket costs of remediation, data breach notification and credit protection for data breach victims and fines for failure to protect private information. The mission of this book is to provide the basics of risk-based security review. To explain the process and steps to take, the information needed, what should be considered, documentation to gather, questions to ask, and how to assess the answers and other information. And finally, how to determine the risk of using a system, and how to complete the Security Review to ensure the best, most secure outcome for your organization. Some timely topics covered in this book: While gathering the CPEs for her CISSP credential renewal Ellen looked for a series of short books targeting different facets of the work she does daily, so she could quickly build her knowledge base and gain 5 CPEs at the same time. This book is the first in what may be a series of short (50-70 page) books on timely cybersecurity topics for practitioners. Please share your thoughts and suggestions with Ellen at: o Seven Security Essentials o When Do You Need A Security Review? o Raising the Bar on Cybersecurity with Risk-based Security Review o The Process of Security Review o Eleven Steps in Security Review o Identifying Security Gaps o Factoring in the Risk
About the Author
Ellen Dutton, CISSP
Conducting Security Reviews since her first book LAN Security Handbook was published in 1994.
System design, development, programming, product development and project management was her focus before the emergence of local area networks and the Internet put our precious information resources at risk. Ellen is delighted to hear from other cybersecurity practitioners about their challenges, concerns and triumphs. Her email is: Ellen Dutton has done security review, information risk management and security architecture in investment banking, pharmaceutical, healthcare, energy and government, and contributed heavily to Congressional briefings on computer security. Ellen wrote CISSP 2019 exam questions at the invitation of (ISC)2.
Buy the eBook on Amazon: Purchase the paperback book: coming soon … Security Review question sample: Buy the full Security Review Interactive Questionnaire: coming soon ... Bookmark and watch this space for related books and materials: Https://Risk-basedSecurityReview.com
Copyright © Ellen Dutton All Rights Reserved Webpage developed, hosted and secured by Alan Scholl email@alanscholl.com.
Risk-based Security Review
 Ellen Dutton, CISSP March 20, 2020
A Security Review how-to handbook in 70 pages Read this Book to earn 5 CISSP CPEs
About the Book
Risk-based Security Review
 Security Review is complicated. Done well it assures us that the systems we use and the vendors we choose are capable of protecting our valuable information. Not done well, it can result in poorly protected systems where cyberattacks are likely to result in tampering, theft, or unauthorized disclosure of data causing loss of private information, trade secrets, and customer data. This can be very expensive in terms of reputational damage, out of pocket costs of remediation, data breach notification and credit protection for data breach victims and fines for failure to protect private information. The mission of this book is to provide the basics of risk-based security review. To explain the process and steps to take, the information needed, what should be considered, documentation to gather, questions to ask, and how to assess the answers and other information. And finally, how to determine the risk of using a system, and how to complete the Security Review to ensure the best, most secure outcome for your organization. Some timely topics covered in this book: While gathering the CPEs for her CISSP credential renewal Ellen looked for a series of short books targeting different facets of the work she does daily, so she could quickly build her knowledge base and gain 5 CPEs at the same time. This book is the first in what may be a series of short (50-70 page) books on timely cybersecurity topics for practitioners. Please share your thoughts and suggestions with Ellen at: o Seven Security Essentials o When Do You Need A Security Review? o Raising the Bar on Cybersecurity with Risk-based Security Review o The Process of Security Review o Eleven Steps in Security Review o Identifying Security Gaps o Factoring in the Risk
About the Author
Ellen Dutton, CISSP
Conducting Security Reviews since her first book LAN Security Handbook was published in 1994.
Ellen Dutton has done security review, information risk management and security architecture in investment banking, pharmaceutical, healthcare, energy and government, and contributed heavily to Congressional briefings on computer security. Ellen wrote CISSP 2019 exam questions at the invitation of (ISC)2.
System design, development, programming, product development and project management was her focus before the emergence of local area networks and the Internet put our precious information resources at risk. Ellen is delighted to hear from other cybersecurity practitioners about their challenges, concerns and triumphs. Her email is:
Buy the eBook on Amazon: Purchase the paperback book: coming soon … Security Review question sample: Buy the full Security Review Interactive Questionnaire: coming soon ... Bookmark and watch this space for related books and materials: Https://Risk-basedSecurityReview.com
Risk-based Security Review A Security Review how-to handbook in 70 pages
 Ellen Dutton, CISSP March 20, 2020 Read this Book to earn 5 CISSP CPEs
About the Book
Risk-based Security Review  Security Review is complicated. Done well it assures us that the systems we use and the vendors we choose are capable of protecting our valuable information. Not done well, it can result in poorly protected systems where cyberattacks are likely to result in tampering, theft, or unauthorized disclosure of data causing loss of private information, trade secrets, and customer data. This can be very expensive in terms of reputational damage, out of pocket costs of remediation, data breach notification and credit protection for data breach victims and fines for failure to protect private information. The mission of this book is to provide the basics of risk-based security review. To explain the process and steps to take, the information needed, what should be considered, documentation to gather, questions to ask, and how to assess the answers and other information. And finally, how to determine the risk of using a system, and how to complete the Security Review to ensure the best, most secure outcome for your organization. Some timely topics covered in this book: While gathering the CPEs for her CISSP credential renewal Ellen looked for a series of short books targeting different facets of the work she does daily, so she could quickly build her knowledge base and gain 5 CPEs at the same time. This book is the first in what may be a series of short (50-70 page) books on timely cybersecurity topics for practitioners. Please share your thoughts and suggestions with Ellen at: o Seven Security Essentials o When Do You Need A Security Review? o Raising the Bar on Cybersecurity with Risk-based Security Review o The Process of Security Review o Eleven Steps in Security Review o Identifying Security Gaps o Factoring in the Risk
About the Author Ellen Dutton, CISSP
Conducting Security Reviews since her first book LAN Security Handbook was published in 1994.
Ellen Dutton has done security review, information risk management and security architecture in investment banking, pharmaceutical, healthcare, energy and government, and contributed heavily to Congressional briefings on computer security. Ellen wrote CISSP 2019 exam questions at the invitation of (ISC)2.
System design, development, programming, product development and project management was her focus before the emergence of local area networks and the Internet put our precious information resources at risk. Ellen is delighted to hear from other cybersecurity practitioners about their challenges, concerns and triumphs. Her email is:
What would you like to do next?
Buy the eBook on Amazon: Purchase the paperback book: coming soon … Security Review question sample: Buy the full Security Review Interactive Questionnaire: coming soon ... Bookmark and watch this space for related books and materials: Https://Risk-basedSecurityReview.com