Jump to ratings and reviews
Rate this book

Managing Risk and Information Security: Protect to Enable

Rate this book
1: Protect to Enable 2: Misperception of Risk 3: Security Governance and Creating Strong Internal Partnerships 4: External Partnerships 5: People are the Perimeter 6: Emerging Capabilities and Usage Models 7: Emerging Threats and Vulnerabilities 8: A New Security Model 9: The 21st Century CISO 10. References

156 pages, Paperback

First published December 12, 2012

123 people are currently reading
179 people want to read

About the author

Malcolm Harkins

7 books1 follower

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
24 (22%)
4 stars
33 (30%)
3 stars
34 (31%)
2 stars
11 (10%)
1 star
7 (6%)
Displaying 1 - 3 of 3 reviews
Profile Image for Lynda.
174 reviews
April 26, 2015
Articulately written and flows well. Most of the recommendations and suggestions the author offers in the book are straightforward and should be practiced by every security professional, or the security professional will find that after reading the book they have already been following most of the author's advice and the book would serve to validate many of what they've been practicing all along. Practical, sound and easy-to-implement advice is always welcome in a day and age when 'sounding complex' to make one look smarter is all too common.
Profile Image for Sam Motes.
941 reviews34 followers
December 30, 2014
Tells the evolving security stance of a leading tech company through the eyes of their CISO from locked down command and control to their current stance of protect to enable. With this stance they embrace new technology to give their employees what they want while still protecting corporate assets.
Displaying 1 - 3 of 3 reviews

Can't find what you're looking for?

Get help and learn more about the design.