Mobile, social, cloud
and big data, each a disruptive force, together change everything related to
protecting systems and information. CROs, CISOs and other risk and security
professionals must use the power of risk management and security to deliver value,
and to influence business decision making.
Table of Contents
·
Introduction
·
Analysis
o Reset Your Approach to
Risk and Security , Balancing the Need to Protect the Organization and the Need
to Run the Business
o Assess and Prioritize
Risks to Support Conscious Choices About What Will — and Will Not — Be Done to
Address Threats
§ Scenario Planning for
Threats
o Understand and
Communicate the Impact IT Risk Has on Business Outcomes
o Accept the Limitations
of Technology to Protect the Organization
o Stop Being a Rule
Follower and Become a Risk Leader
o Relate Security and
Risk to Business Impact With Executive- and Board-Level Reporting
o Integrate Risk and
Corporate Performance
o
Reset a Failing Risk and Security
Program
Comments