Skip to content Skip to sidebar Skip to footer
cybersecurity-program-security-manager-handbook-rothstein-publishing

Is YOUR CyberSecurity Program Up to the Challenge?

What about the legal aspects of cybersecurity? ARE YOU AT RISK?

With critical information assets at risk, your company requires a state-of-the-art cybersecurity program. But how do you achieve the best possible program? Tari Schreider, in Building Effective Cybersecurity Programs: A Security Manager’s Handbook, lays out the step-by-step roadmap to follow as you build or enhance your cybersecurity program. Building Effective Cybersecurity Programs: A Security Manager’s Handbook is organized around the six main steps on the roadmap that will put your cybersecurity program in place:
  1. Design a Cybersecurity Program.
  2. Establish a Foundation of Governance.
  3. Build a Threat, Vulnerability Detection, and Intelligence Capability.
  4. Build a Cyber Risk Management Capability.
  5. Implement a Defense-in-Depth Strategy.
  6. Apply Service Management to Cybersecurity Programs.

Read More

Continuity Insights Newsletter – Addressing the Front-Line Needs of Today’s BC Professionals; Business Continuity Trends and Challenges for 2018

Subscribe Past Issues RSS Translate Addressing the Front-Line Needs of Today's BC Professionals; Business Continuity Trends and Challenges for 2018 JANUARY 4, 2018 Addressing the Front-Line Needs of Today’s BC Professionals Conferences are key to gathering information and learning new techniques from your peers and experienced professionals within the business continuity community. The 16th annual Continuity…

Read More

simplifying-cause-analysis-structured-approach-chester-rowe-rothstein-publishing

A Step-by-Step Approach to Your Successful Cause Investigation

When the challenge is to get to the heart of a problem, you need a simple and efficient cause investigation methodology. And what would make a real difference would be an interactive map to lead you to the answer every time. Chester Rowe’s Simplifying Cause Analysis: A Structured Approach combines an instruction book with a downloadable Interactive Cause Analysis Tool – for the results you have been looking for. The book is intended for professionals like you. You have some familiarity with cause analysis projects, but you’re looking for a simple and efficient cause investigation methodology – a more effective and insightful way of asking “why?”

Read More

enterprise-security-risk-management-concepts-and-applications-by-brian-allen-and-rachelle-loyear-rothstein-publishing

Enterprise Security Risk Management: Concepts & Applications

As a security professional, have you found that you and others in your company do not always define “security” the same way? Perhaps security interests and business interests have become misaligned. Brian Allen and Rachelle Loyear offer a new approach: Enterprise Security Risk Management (ESRM). By viewing security through a risk management lens, ESRM can help make you and your security program successful. In their long-awaited book, based on years of practical experience and research, Brian Allen and Rachelle Loyear show you step-by-step how Enterprise Security Risk Management (ESRM) applies fundamental risk principles to manage all security risks. Whether the risks are informational, cyber, physical security, asset management, or business continuity, all are included in the holistic, all-encompassing ESRM approach which will move you from task-based to risk-based security.

Read More

enterprise-security-risk-management-concepts-and-applications-by-brian-allen-and-rachelle-loyear-rothstein-publishing

Physical and Logical Security: Joining Forces to Manage your Enterprise Security Risk

Just a decade ago, as security professionals, we could talk reasonably about physical security and logical security requiring different approaches. Five years ago, we might have found ourselves having conversations about the blurring lines between the two types of security discipline, and could have easily pointed to aspects of both physical and logical security that…

Read More

cybersecurity-program-security-manager-handbook-rothstein-publishing

Building Effective Cybersecurity Programs: A Security Manager’s Handbook

You know by now that your company could not survive without the Internet. Not in today’s market. You are either part of the digital economy or reliant upon it. With critical information assets at risk, your company requires a state-of-the-art cybersecurity program. But how do you achieve the best possible program? Tari Schreider, in Building Effective Cybersecurity Programs: A Security Manager’s Handbook, lays out the step-by-step roadmap to follow as you build or enhance your cybersecurity program. Over 30+ years, Tari Schreider has designed and implemented cybersecurity programs throughout the world, helping hundreds of companies like yours. Building on that experience, he has created a clear roadmap that will allow the process to go more smoothly for you.

Read More

adaptive-business-continuity-new-approach-rothstein-publishing

Adaptive Business Continuity: A New Approach – NEW Book

Have you begun to question traditional best practices in business continuity (BC)? Do you seem to be concentrating on documentation rather than preparedness? Compliance rather than recoverability? Do your efforts provide true business value? If you have these concerns, David Lindstedt and Mark Armour offer a solution in Adaptive Business Continuity: A New Approach. This ground-breaking new book provides a streamlined, realistic methodology to change BC dramatically.

Read More

comprehensive-business-continuity-template-rothstein-publishing

Get your Business Continuity Tools and Templates Now

Get your Business Continuity, Crisis Management and Resilience programs going with these powerful tools and templates for Businesses of all types and sizes  – including Services, Manufacturing and Distribution!

Collect information and evaluate your business environment, identify and reduce risks, analyze business operations, analyze alternatives to respond to disruptions, develop a comprehensive Business Continuity Plan, and prepare for and respond to hazards-specific events with The Template for Comprehensive Business Continuity Management to Enhance Your Organization’s Resilience.

Read More

blindsided-crisis-leadership-rothstein-publishing

Don’t Get Blindsided! Get Your Guide to Crisis Leadership

A crisis strikes out of the blue, at the time and place least expected. In a word, you’re Blindsided! According to Bruce T. Blythe, managing a crisis is an ultimate test of leadership, requiring leaders who inspire loyalty and trust as they rise to the occasion to meet the needs of people. Blythe shows you what it takes to be an effective and humane strategic crisis leader, a “crisis whisperer.” While other books talk about crisis leadership, this one lands you in the middle of a fast-breaking crisis and demonstrates what a top-notch leader, a “crisis whisperer,” would say and do at every twist and turn. Blythe pulls up a chair and coaches you with real-world examples of what has worked — and not worked — in 30 years of experience with hundreds of companies just like yours. Some books tell you how to create a crisis response plan. Others tell you how to cope with the crisis as it takes place. Blythe does both.

Read More

E-mail
Password
Confirm Password