Information Security Today Home

Books by Tom Peltier

Information Security Policies and Procedures: A Practitioner's Reference, Second Edition
Complete Guide to CISM Certification
Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management
Information Security Fundamentals
Managing a Network Vulnerability Assessment

How to Complete a Risk Assessment in 5 Days or Less

An Interview with Tom Peltier

Listen as Tom Peltier explains how to do the seemingly impossible: perform a risk assessment in less than five. In this podcast, Tom presents an overview of the various processes that you can employ in assessing risk

Listen to interview.

Based on his wildly successful seminar, Tom's new book, How to Complete a Risk Assessment in 5 Days or Less, presents in detail the various processes that you can employ in assessing risk, fully detailing each of their strengths and weaknesses. With this information, you will be able to determine what processes best fit the needs of a given situation to mitigate risk levels. Always conscious of the bottom line, Tom discusses the cost-benefit of risk mitigation and looks at specific ways to manage costs. He supports his conclusions with numerous case studies and explains through diagrams that show how to apply risk management skills in any organization with regard to any business endeavor.


About the Author

Tom Peltier is in his fifth decade working with computer technology. During this time he has garnered numerous industry honors for sharing his experiences with follow professionals. Because of his work he was given the 1993 Computer Security Institute’s (CSI) Lifetime Achievement Award. In 1999, the Information Systems Security Association (ISSA) bestowed on him its Individual Contribution to the Profession Award, and in 2001 he was inducted into the ISSA Hall of Fame. Tom was also awarded the CSI Lifetime Emeritus Membership Award. Click here to learn more about Tom.
 
Subscribe to
Information Security Today






Powered by VerticalResponse

Share This Article



© Copyright 2008 Auerbach Publications