SlideShare a Scribd company logo
1 of 1
Download to read offline
1ISACA JOURNAL VOLUME 1, 2015
There is always a new information security issue
to focus on, another area of key concern relating
to IT security, data security or business continuity
planning that security professionals need to be
aware of to keep on top of the relevant risk. But
how can security professionals determine the
relevant risk to their industry? At a time when
changes in technology continue to accelerate,
how can anyone decide what should be the
information security areas of concern to their
company and the places where they
should focus their team’s work in
the future?
Secure: Insights From the People
Who Keep Information Safe is a
collection of works from senior
IT leaders in various industries
providing what they feel are the
biggest security concerns right now
and for the future. In this quick,
compact read, readers can gather
understanding from those in the
know and can consider if these
experts’ ideas about leadership
competencies needed in the future,
design security or application
delivery networks are applicable to their
enterprise/industry. Everyone from technical
practitioners to those just beginning their IS
audit, security, risk or governance careers can
find value in this general management book as it
keeps readers aware of the latest risk concerns.
The book’s primary strength is its ability to
provide the reader with valuable information on
upcoming information security and technology
issues, which are highlighted by the opinions of
10 IT information security leaders. The writings
of each leader are engaging and succinct. As a
result, readers can quickly get through a chapter
and gather the information they need on a bus or
train ride or between meetings. This book is ideal
for anyone who does not have time to read a full
book on the subject, but wants to be aware from
where the next risk to IT is coming. Additionally,
background on each leader and his/her company
is provided, so the reader can determine if the
author’s industry shares the same risk
factors/concerns.
The world of information security is
constantly changing. The number of Internet
users has grown exponentially, smartphone and
mobile use is exploding, and social media web
sites are used more and more to
do business. Those at all levels
within IS audit, risk, security and
governance struggle to stay abreast
of these changes and keep aware
of what the real concerns are to
know where to focus their efforts.
While the risk is also exploding, IS
professionals need to focus on the
right risk: those that are growing,
those that are relevant and those
that are of a bigger concern.
Despite the rapidly changing
nature of security and risk, this
book will remain relevant for years.
The majority of the leaders in this
book focus on entity-level and governance risk;
as a result, the insights provided in this book
are at a high enough level that they will remain
relevant for years to come. This book is perfect
for today’s IS professional who needs to learn a
lot of information, but does not have much time
to do so.
EDITOR’S NOTE
Secure: Insights From the People Who Keep
Information Safe is available from the ISACA
Bookstore. For information, see the ISACA
Bookstore Supplement in this Journal,
visit www.isaca.org/bookstore, email
bookstore@isaca.org or telephone
+1.847.660.5650.
Reviewed by A. Krista
Kivisild, CISA, CA, who has
had a diverse career in audit
while working in government,
private companies and public
organizations. Kivisild
has experience in IT
audit, governance,
compliance/regulatory
auditing, value-for-money
auditing and operational
auditing. She has served as a
volunteer instructor, training
not-for-profit boards on
board governance concepts;
has worked with the Alberta
(Canada) Government Board
Development Program;
and has served as the
membership director and
CISA director for the ISACA
Winnipeg (Manitoba, Canada)
Chapter.
Secure: Insights From the People
Who Keep Information Safe
Do you have
something
to say about
this article?
Visit the Journal
pages of the ISACA
web site (www.isaca.
org/journal), find the
article, and choose
the Comments tab to
share your thoughts.
Go directly to the article:
By Mary Lou Heastings

More Related Content

Similar to Secure-Insights-From-the-People-Who-Keep-Information-Safe_joa_Eng_0115

IT-Security-Governance-Innovations_joa_Eng_0515
IT-Security-Governance-Innovations_joa_Eng_0515IT-Security-Governance-Innovations_joa_Eng_0515
IT-Security-Governance-Innovations_joa_Eng_0515A Krista Kivisild
 
Influential Business Leaders in Security services | CIO Look
Influential Business Leaders in Security services | CIO LookInfluential Business Leaders in Security services | CIO Look
Influential Business Leaders in Security services | CIO LookCIO Look Magazine
 
Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland Devendra kashyap
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network Mighty Guides, Inc.
 
Mobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeMobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeBlackBerry
 
Risksense: 7 Experts on Threat and Vulnerability Management
Risksense: 7 Experts on Threat and Vulnerability ManagementRisksense: 7 Experts on Threat and Vulnerability Management
Risksense: 7 Experts on Threat and Vulnerability ManagementMighty Guides, Inc.
 
IT-Auditing-and-Application-Controls-for-Small-and-Mid-sized-Enterprises_joa_...
IT-Auditing-and-Application-Controls-for-Small-and-Mid-sized-Enterprises_joa_...IT-Auditing-and-Application-Controls-for-Small-and-Mid-sized-Enterprises_joa_...
IT-Auditing-and-Application-Controls-for-Small-and-Mid-sized-Enterprises_joa_...A Krista Kivisild
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Bala Guntipalli ♦ MBA
 
Stephane Nappo. January 2023. Top Cyber News MAGAZINE.pdf
Stephane Nappo. January 2023. Top Cyber News MAGAZINE.pdfStephane Nappo. January 2023. Top Cyber News MAGAZINE.pdf
Stephane Nappo. January 2023. Top Cyber News MAGAZINE.pdfStéphane Nappo
 
Building World Class Cybersecurity Teams
Building World Class Cybersecurity TeamsBuilding World Class Cybersecurity Teams
Building World Class Cybersecurity TeamsJoyce Brocaglia
 
Under cyber attack: EY's Global information security survey 2013
Under cyber attack: EY's Global information security survey 2013Under cyber attack: EY's Global information security survey 2013
Under cyber attack: EY's Global information security survey 2013EY
 
News letter May 11
News letter May 11News letter May 11
News letter May 11captsbtyagi
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFLaurie Mosca-Cocca
 
Nexus It Group Resume Writing
Nexus It Group   Resume WritingNexus It Group   Resume Writing
Nexus It Group Resume Writingtlinde
 
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating ProvidersBlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating ProvidersMighty Guides, Inc.
 
These are 4 discussions posts responses, I need one response per p.docx
These are 4 discussions posts responses, I need one response per p.docxThese are 4 discussions posts responses, I need one response per p.docx
These are 4 discussions posts responses, I need one response per p.docxrandymartin91030
 

Similar to Secure-Insights-From-the-People-Who-Keep-Information-Safe_joa_Eng_0115 (20)

IT-Security-Governance-Innovations_joa_Eng_0515
IT-Security-Governance-Innovations_joa_Eng_0515IT-Security-Governance-Innovations_joa_Eng_0515
IT-Security-Governance-Innovations_joa_Eng_0515
 
Influential Business Leaders in Security services | CIO Look
Influential Business Leaders in Security services | CIO LookInfluential Business Leaders in Security services | CIO Look
Influential Business Leaders in Security services | CIO Look
 
Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network
 
Mobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeMobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat Landscape
 
Risksense: 7 Experts on Threat and Vulnerability Management
Risksense: 7 Experts on Threat and Vulnerability ManagementRisksense: 7 Experts on Threat and Vulnerability Management
Risksense: 7 Experts on Threat and Vulnerability Management
 
IT-Auditing-and-Application-Controls-for-Small-and-Mid-sized-Enterprises_joa_...
IT-Auditing-and-Application-Controls-for-Small-and-Mid-sized-Enterprises_joa_...IT-Auditing-and-Application-Controls-for-Small-and-Mid-sized-Enterprises_joa_...
IT-Auditing-and-Application-Controls-for-Small-and-Mid-sized-Enterprises_joa_...
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
 
Stephane Nappo. January 2023. Top Cyber News MAGAZINE.pdf
Stephane Nappo. January 2023. Top Cyber News MAGAZINE.pdfStephane Nappo. January 2023. Top Cyber News MAGAZINE.pdf
Stephane Nappo. January 2023. Top Cyber News MAGAZINE.pdf
 
Building World Class Cybersecurity Teams
Building World Class Cybersecurity TeamsBuilding World Class Cybersecurity Teams
Building World Class Cybersecurity Teams
 
The 10 Most Influential Leaders in Business 2019
The 10 Most Influential Leaders in Business 2019The 10 Most Influential Leaders in Business 2019
The 10 Most Influential Leaders in Business 2019
 
Under cyber attack: EY's Global information security survey 2013
Under cyber attack: EY's Global information security survey 2013Under cyber attack: EY's Global information security survey 2013
Under cyber attack: EY's Global information security survey 2013
 
GITA March 2015 Newsletter
GITA March 2015 NewsletterGITA March 2015 Newsletter
GITA March 2015 Newsletter
 
Ey giss-under-cyber-attack
Ey giss-under-cyber-attackEy giss-under-cyber-attack
Ey giss-under-cyber-attack
 
News letter May 11
News letter May 11News letter May 11
News letter May 11
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
 
Nexus It Group Resume Writing
Nexus It Group   Resume WritingNexus It Group   Resume Writing
Nexus It Group Resume Writing
 
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating ProvidersBlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
 
csxnewsletter
csxnewslettercsxnewsletter
csxnewsletter
 
These are 4 discussions posts responses, I need one response per p.docx
These are 4 discussions posts responses, I need one response per p.docxThese are 4 discussions posts responses, I need one response per p.docx
These are 4 discussions posts responses, I need one response per p.docx
 

Secure-Insights-From-the-People-Who-Keep-Information-Safe_joa_Eng_0115

  • 1. 1ISACA JOURNAL VOLUME 1, 2015 There is always a new information security issue to focus on, another area of key concern relating to IT security, data security or business continuity planning that security professionals need to be aware of to keep on top of the relevant risk. But how can security professionals determine the relevant risk to their industry? At a time when changes in technology continue to accelerate, how can anyone decide what should be the information security areas of concern to their company and the places where they should focus their team’s work in the future? Secure: Insights From the People Who Keep Information Safe is a collection of works from senior IT leaders in various industries providing what they feel are the biggest security concerns right now and for the future. In this quick, compact read, readers can gather understanding from those in the know and can consider if these experts’ ideas about leadership competencies needed in the future, design security or application delivery networks are applicable to their enterprise/industry. Everyone from technical practitioners to those just beginning their IS audit, security, risk or governance careers can find value in this general management book as it keeps readers aware of the latest risk concerns. The book’s primary strength is its ability to provide the reader with valuable information on upcoming information security and technology issues, which are highlighted by the opinions of 10 IT information security leaders. The writings of each leader are engaging and succinct. As a result, readers can quickly get through a chapter and gather the information they need on a bus or train ride or between meetings. This book is ideal for anyone who does not have time to read a full book on the subject, but wants to be aware from where the next risk to IT is coming. Additionally, background on each leader and his/her company is provided, so the reader can determine if the author’s industry shares the same risk factors/concerns. The world of information security is constantly changing. The number of Internet users has grown exponentially, smartphone and mobile use is exploding, and social media web sites are used more and more to do business. Those at all levels within IS audit, risk, security and governance struggle to stay abreast of these changes and keep aware of what the real concerns are to know where to focus their efforts. While the risk is also exploding, IS professionals need to focus on the right risk: those that are growing, those that are relevant and those that are of a bigger concern. Despite the rapidly changing nature of security and risk, this book will remain relevant for years. The majority of the leaders in this book focus on entity-level and governance risk; as a result, the insights provided in this book are at a high enough level that they will remain relevant for years to come. This book is perfect for today’s IS professional who needs to learn a lot of information, but does not have much time to do so. EDITOR’S NOTE Secure: Insights From the People Who Keep Information Safe is available from the ISACA Bookstore. For information, see the ISACA Bookstore Supplement in this Journal, visit www.isaca.org/bookstore, email bookstore@isaca.org or telephone +1.847.660.5650. Reviewed by A. Krista Kivisild, CISA, CA, who has had a diverse career in audit while working in government, private companies and public organizations. Kivisild has experience in IT audit, governance, compliance/regulatory auditing, value-for-money auditing and operational auditing. She has served as a volunteer instructor, training not-for-profit boards on board governance concepts; has worked with the Alberta (Canada) Government Board Development Program; and has served as the membership director and CISA director for the ISACA Winnipeg (Manitoba, Canada) Chapter. Secure: Insights From the People Who Keep Information Safe Do you have something to say about this article? Visit the Journal pages of the ISACA web site (www.isaca. org/journal), find the article, and choose the Comments tab to share your thoughts. Go directly to the article: By Mary Lou Heastings