Skip to main content
Presentation
Book Review: Security Risk Management: Building an Information Security Risk Management Program from the Ground Up
Computers & Security Journal (2012)
  • Katina Michael, University of Wollongong
Abstract

In an age of outsourcing tasks that are not considered to be a core competency of the business, organisations have often relied on external consultants for matters pertaining to security. In actual fact, most companies could have utilized existing skill-sets in-house to produce a security risk management program, if only they knew what steps to take, and how to go about it all. Evan Wheeler in his book on information security risk management does just that- he equips professionals tasked with security, with the thinking required to create a program that is more preoccupied with the complex strategic-level questions than the technical or operational level skills required to execute particular tools and applications. Wheeler, a practicing security consultant himself, asks the big questions which technicians usually cannot answer beginning with the “why” question. From Wheeler’s perspective it is important that those who have been given the role to manage security, have the upper management support to act as “internal” consultants with clear roles and responsibilities defined from the outset, given resource allocation limitations. Wheeler’s book offers a simple to understand risk management lifecycle where the business owners are empowered to manage their own risks with the security team playing a supporting role as policymaker and overseer. Security thus becomes everyone’s problem.

Keywords
  • security,
  • risk management,
  • life cycle,
  • program,
  • consultants
Publication Date
January 5, 2012
Comments
See final version Elsevier: Katina Michael, Security Risk Management: Building an Information Security Risk Management Program from the Ground Up (Book Review), 2012, http://dx.doi.org/10.1016/j.cose.2011.12.011
Citation Information
Katina Michael. "Book Review: Security Risk Management: Building an Information Security Risk Management Program from the Ground Up" Computers & Security Journal (2012)
Available at: http://works.bepress.com/kmichael/248/