
Risk-based Security Review
Security Review is complicated. Done well it assures US that the systems we use and the vendors we choose are capable of protecting our valuable information. Not done well, it can result in poorly protected systems where cyberattacks are likely to result in tampering, theft, or unauthorized disclosure of data causing loss of private information, trade secrets, and customer data. This can be very expensive in terms of reputational damage, out of pocket costs of remediation, data breach notification and credit protection for data breach victims and fines for failure to protect private information. The mission of this book is to provide the basics of risk-based security review. To explain the process and steps to take, the information needed, what should be considered, documentation to gather, questions to ask, and how to assess the answers and other information. And finally, how to determine the risk of using a system, and how to complete the Security Review to ensure the best, most secure outcome for your organization.
Some timely topics covered in this book:
While gathering the CPEs for her CISSP credential renewal Ellen looked for a series of short books targeting different facets of the work she does daily, so she could quickly build her knowledge base and gain 5 CPEs at the same time. This book is the first in what may be a series of short (50-70 page) books on timely cybersecurity topics for practitioners.

Ellen Dutton has done security review, information risk management and security architecture in investment banking, pharmaceutical, healthcare, energy and government, and contributed heavily to Congressional briefings on computer security. Ellen wrote CISSP 2019 exam questions at the invitation of (ISC)2.
System design, development, prog
Ellen Dutton has done security review, information risk management and security architecture in investment banking, pharmaceutical, healthcare, energy and government, and contributed heavily to Congressional briefings on computer security. Ellen wrote CISSP 2019 exam questions at the invitation of (ISC)2.
System design, development, programming, product development and project management was her focus before the emergence of local area networks and the Internet put our precious information resources at risk.
Ellen is delighted to hear from other cybersecurity practitioners about their challenges, concerns and triumphs. Her email is: EllenDutton@electronicdatainfosec.com
risk-based-security-review-questionnaire-sample (xlsx)
DownloadWe use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.