web analytics

Risk and Privacy FREE BOOK

Rate this post

The importance of businesses being ‘operationally resilient’ is becoming increasingly important, and a driving force behind whether an organization can ensure that its valuable business operations can ‘bounce back’ from or manage to evade impactful occurrences is its security risk management capabilities.
In this book, we change the perspective on an organization’s operational resilience capabilities so that it changes from being a reactive (tick box) approach to being proactive. The perspectives of every chapter in this book focus on risk profiles and how your business can reduce these profiles using effective mitigation measures.
The book is divided into two sections:

  1. Security Risk Management (SRM).
    All the components of security risk management contribute to your
    organization’s operational resilience capabilities, to help reduce
    your risks.
  • Reduce the probability/l ikelihood.
  1. Survive to Operate.
    If your SRM capabilities fail your organization, these are the components that are needed to allow you to quickly ‘bounce back.’
  • Reduce the severity/i mpact.

Rather than looking at this from an operational resilience compliance capabilities aspect, we have written these to be agnostic of any specific operational resilience framework (e.g., CERT RMM, ISO 22316, SP 800- 160 Vol. 2 Rev. 1, etc.), with the idea of looking at operational resilience through a risk management lens instead.
This book is not intended to replace these numerous operational resilience standards/ frameworks but, rather, has been designed to complement them by getting you to appreciate their value in helping to identify and mitigate your operational resilience risks.
Unlike the cybersecurity or information security domains, operational resilience looks at the risks from a business- oriented view, so that anything that might disrupt your essential business operations are risk- assessed and appropriate countermeasures identified and applied.
Consequently, this book is not limited to cyberattacks or the loss of sensitive data but, instead, looks at things from a holistic business-based perspective.

Views: 3


advisor pick´S post

More Latest Published Posts