- Hardcover: 512 pages
- Publisher: Auerbach Publications; 1 edition (January 8, 2013)
- Language: English
- ISBN-10: 1439881529
- ISBN-13: 978-1439881521
- Product Dimensions: 6.1 x 1.1 x 9.2 inches
- Shipping Weight: 1.9 pounds (View shipping rates and policies)
- Average Customer Review: 10 customer reviews
- Amazon Best Sellers Rank: #629,260 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
PRAGMATIC Security Metrics: Applying Metametrics to Information Security 1st Edition
Use the Amazon App to scan ISBNs and compare prices.
"Warlight" by Michael Ondaatje
A dramatic coming-of-age story set in the decade after World War II, "Warlight" is the mesmerizing new novel from the best-selling author of "The English Patient." Learn more
Frequently bought together
What other items do customers buy after viewing this item?
Like all books on metrics, PRAGMATIC Security Metrics: Applying Metametrics to Information Security makes the statement that "you can't manage what you can't measure". The authors claim that other books on information security metrics discuss number theory and statistics in academic terms. This title promises to be light on mathematics and heavy on utility and is meant as a how-to-do-it guide for security metrics.
As to the title, PRAGMATIC is an acronym for the basis of the method of the book, in using metrics that are predictive, relevant, actionable, genuine, meaningful, timely, independent and cost. After reading the first chapter, PRAGMATIC Security Metrics: Applying Metametrics to Information Security looks like it may live up to its promise of being able to use metrics not only to track and report performance but to identify problem areas and opportunities, and drive information security improvements. If so, this could be the metrics book a lot of information security professionals have been waiting for.
―Ben Rothke, CISSP, CISM, Information Security Manager, Wyndham Worldwide; and author of Computer Security: 20 Things Every Employee Should Know, writing on the RSA Conference Blog, www.rsaconference.com
About the Author
Krag Brotby CISM CGEIT has 30 years' experience in enterprise computer security architecture, governance, risk, and metrics. He is the principal author/editor of ISACA's Certified Information Security Manager Review Manual, plus Information Security Governance: Guidance for Boards of Directors and Guidance for Information Security Managers; Information Security Management Metrics; and Information Security Governance: A Practical Development and Implementation Approach. Krag has served on ISACA committees and the California High Tech Task Force Steering Committee, and frequently presents conference workshops and seminars. Krag was the principal architect for Xerox BASIA enterprise security and the SWIFT Next Gen PKI; served as technical director at RAND Corporation and chief security strategist for TransactPlus. He developed policies for several U.S. banks and consulted for Australia Post, New Zealand Inland Revenue, Singapore Infocom Development Agency, Microsoft, Unisys, AT&T, BP Alyeska, Countrywide Financial, Informix, Visa, VeriSign, Digital Signature Trust, Zantaz, Bank Al-Bilad, J.P. Morgan Chase, KeyBank, Certicom, and Paycom, among others. Krag delivers courses in metrics, governance‐risk‐compliance (GRC) and risk, and holds a foundation patent for digital rights management.
Dr Gary Hinson PhD MBA CISSP has worked in IT system and network administration, information security and IT auditing with multinationals in the pharmaceuticals/life sciences, utilities, IT, engineering, defense, and financial services industries, since the 1980s, and consulting since 2000. His day job involves preparing security awareness materials for NoticeBored (NoticeBored.com), an innovative subscription service. He is also responsible for ISO27001security.com, the ISO27k Toolkit and Forum supporting a global user community. Gary was originally a scientist researching bacterial genetics. The rational scientist and metrician still lurks deep within.
Top customer reviews
There was a problem filtering reviews right now. Please try again later.
The authors claim that other books on information security metrics discuss number theory and statistics in academic terms. This title promises to be light on mathematics and heavy on utility and is meant as a how-to-do-it guide for security metrics.
Based on that claim, the authors likely had a book such as Data-Driven Security: Analysis, Visualization and Dashboards by Jay Jacobs and Bob Rudis in mind. As Jacobs and Rudis do indeed use statistics extensively in their approach to security metrics.
As to the title, PRAGMATIC is an acronym for the basis of the method of the book, in using metrics that are predictive, relevant, actionable, genuine, meaningful, timely, independent and cost.
One of the benefits of the book is that it provides a method to create quantitative methods for risk, and how to estimate which resources to use to mitigate those identified risks
The authors note that as a consequence of the way the field of information security has developed from IT security, current practice in security metrics seems to be driving by the availability of raw data from firewalls and other systems. But when it comes to measuring security, many organizations completely ignore the nontechnical factors that are often of equal importance to managing information security in a manner that supports the firm’s business objectives. And that is precisely the gap the book is attempting to fix.
Chapter 7 makes up the bulk of the book when it details over 150 different useful metrics in which to use.
For those looking for a book in which to develop their information security metrics program, in PRAGMATIC Security Metrics: Applying Metametrics to Information Security is a valuable reference.