{"id":13186,"date":"2016-06-14T14:00:27","date_gmt":"2016-06-14T17:00:27","guid":{"rendered":"http:\/\/www.bibliotecadeseguranca.com.br\/fr\/?p=13186"},"modified":"2016-06-14T00:15:53","modified_gmt":"2016-06-14T03:15:53","slug":"security-metrics-replacing-fear-uncertainty-and-doubt","status":"publish","type":"post","link":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/livros\/security-metrics-replacing-fear-uncertainty-and-doubt\/","title":{"rendered":"Security Metrics: Replacing Fear, Uncertainty, and Doubt"},"content":{"rendered":"<p><span style=\"color: #003366;\"><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-13187\" src=\"http:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2016\/06\/Security-Metrics-Replacing-Fear-Uncertainty-and-Doubt.jpg\" alt=\"Security Metrics: Replacing Fear, Uncertainty, and Doubt\" width=\"145\" height=\"192\" srcset=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2016\/06\/Security-Metrics-Replacing-Fear-Uncertainty-and-Doubt.jpg 145w, https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2016\/06\/Security-Metrics-Replacing-Fear-Uncertainty-and-Doubt-113x150.jpg 113w\" sizes=\"auto, (max-width: 145px) 100vw, 145px\" \/>Andrew Jaquith<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>Maison d&#8217;\u00e9dition Addison-Wesley<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>R\u00e9sum\u00e9:<\/strong><\/span> Security Metrics is the first comprehensive best-practice guide to defining, creating, and utilizing security metrics in the enterprise.<\/p>\n<p>Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization\u2019s unique requirements. You\u2019ll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management.<\/p>\n<p>Security Metrics successfully bridges management\u2019s quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith\u2019s extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. You\u2019ll learn how to:<\/p>\n<ul>\n<li>Replace nonstop crisis response with a systematic approach to security improvement;<\/li>\n<li>Understand the differences between \u201cgood\u201d and \u201cbad\u201d metrics;<\/li>\n<li>Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk;<\/li>\n<li>Quantify the effectiveness of security acquisition, implementation, and other program activities;<\/li>\n<li>Organize, aggregate, and analyze your data to bring out key insights;<\/li>\n<li>Use visualization to understand and communicate security issues more clearly;<\/li>\n<li>Capture valuable data from firewalls and antivirus logs, third-party auditor reports, and other resources;<\/li>\n<li>Implement balanced scorecards that present compact, holistic views of organizational security effectiveness.<\/li>\n<\/ul>\n<p>Whether you\u2019re an engineer or consultant responsible for security and reporting to management\u2013or an executive who needs better information for decision-making\u2013Security Metrics is the resource you have been searching for.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Andrew Jaquith Maison d&#8217;\u00e9dition Addison-Wesley R\u00e9sum\u00e9: Security Metrics is the first comprehensive best-practice guide to defining, creating, and utilizing security metrics in the enterprise. Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization\u2019s unique requirements. You\u2019ll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses,&hellip; <\/p>\n","protected":false},"author":3,"featured_media":13187,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[51,23,6,20],"tags":[],"class_list":["post-13186","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-english","category-gestao-da-seguranca-empresarial","category-livros","category-seguranca-da-informacao"],"views":314,"_links":{"self":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/13186","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/comments?post=13186"}],"version-history":[{"count":1,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/13186\/revisions"}],"predecessor-version":[{"id":13188,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/13186\/revisions\/13188"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media\/13187"}],"wp:attachment":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media?parent=13186"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/categories?post=13186"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/tags?post=13186"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}