Skip to content Skip to sidebar Skip to footer
building-effective-cybersecurity-program-rothstein-publishing

New Book: Building an Effective Cybersecurity Program 2nd Edition by Tari Schreider

You know by now that your company could not survive without the Internet. Not in today’s market. You are either part of the digital economy or reliant upon it. With critical information assets at risk, your company requires a state-of-the-art cybersecurity program. But how do you achieve the best possible program? Tari Schreider, in Building Effective…

Read More

building-effective-cybersecurity-program-rothstein-publishing

New Book: Building an Effective Cybersecurity Program 2nd Edition by Tari Schreider

You know by now that your company could not survive without the Internet. Not in today’s market. You are either part of the digital economy or reliant upon it. With critical information assets at risk, your company requires a state-of-the-art cybersecurity program. But how do you achieve the best possible program? Tari Schreider, in Building Effective…

Read More

simplifying-cause-analysis-structured-approach-chester-rowe-rothstein-publishing

How To Simplify Cause Analysis With Interactive Tools

When the challenge is to get to the heart of a problem, you need a simple and efficient cause investigation methodology. And what would make a real difference would be an interactive map to lead you to the answer every time. Chester Rowe’s Simplifying Cause Analysis: A Structured Approach combines an instruction book with a downloadable Interactive Cause Analysis Tool – for the results you have been looking for. The book is intended for professionals like you. However, it is not intended to be used alone. In addition, to the tools provided in this book you will also need the help with the cause road map. The cause analysis tools will also require you and others to organize, analyze, and present the results of your investigation. You have some familiarity with cause analysis projects, but you’re looking for a simple and efficient cause investigation methodology – a more effective and insightful way of asking “why?”

Read More

adaptive-business-continuity-new-approach-rothstein-publishing

Adaptive Business Continuity: A NEW Approach

Have you begun to question traditional best practices in business continuity (BC)? Do you seem to be concentrating on documentation rather than preparedness? Compliance rather than recoverability? Do your efforts provide true business value? If you have these concerns, David Lindstedt and Mark Armour offer a solution in Adaptive Business Continuity: A New Approach. This ground-breaking book provides a streamlined, realistic methodology to change BC dramatically.

Read More

enterprise-security-risk-management-concepts-applications-esrm-book-rothstein-publishing

Can Enterprise Security Risk Management Help Your Security Program? GET YOUR FREE CHAPTER NOW!

How Can Enterprise Security Risk Management (ESRM) Help Your Security Program?

Find out now with your FREE Chapter!

You will:
  • Explore how security has traditionally been viewed both inside and outside of the security profession.
  • Understand how ESRM can change the perception of security in your enterprise to help you better communicate the value of security risk management.
  • See how ESRM is the best methodology to meet the changing global security risk climate.

Read More

enterprise-security-risk-management-concepts-applications-esrm-book-rothstein-publishing

Enterprise Security Risk Management (ESRM): Concepts & Applications

As a security professional, have you found that you and others in your company do not always define “security” the same way? Have security interests and business interests become misaligned? Brian Allen and Rachelle Loyear offer a NEW approach: Enterprise Security Risk Management (ESRM). By viewing security through a risk management lens, ESRM can help make you and your security program successful! Brian Allen and Rachelle Loyear show you step-by-step how Enterprise Security Risk Management (ESRM) applies fundamental risk principles to manage all security risks, based on years of practical experience and research. Whether risks you face are informational, cyber, physical security, asset management, or business continuity, all are included in the holistic, all-encompassing ESRM approach which will move you from task-based to risk-based security.

Read More

principles-practice-business-continuity-textbook-rothstein-publishing

How Do You Master Business Continuity?

Are you a Business Continuity Manager or training for the job? Are you ready to keep your business up and running in the face of disruption? In this second edition of Principles and Practice of Business Continuity: Tools and Techniques, Jim Burtles explains six main scenarios. He promises: “If you and your organization are prepared to deal with these six generic risks, you will be able to recover from any business disaster!” Principles and Practice of Business Continuity: Tools and Techniques is organized with all the features you need to master business continuity.

Read More

E-mail
Password
Confirm Password