These are the sources and citations used to research week 7. This bibliography was generated on Cite This For Me on

  • E-book or PDF

    A structured approach to Enterprise Risk Management (ERM) and the requirements of ISO 31000

    2010

    In-text: (A structured approach to Enterprise Risk Management (ERM) and the requirements of ISO 31000, 2010)

    Your Bibliography: 2010. A structured approach to Enterprise Risk Management (ERM) and the requirements of ISO 31000. 1st ed. [ebook] Available at: <https://www.theirm.org/media/886062/ISO3100_doc.pdf> [Accessed 15 May 2018].

  • Online image or video

    Beginners ultimate guide to ISO 27001 Information Security Management Systems

    2017

    In-text: (Beginners ultimate guide to ISO 27001 Information Security Management Systems, 2017)

    Your Bibliography: 2017. Beginners ultimate guide to ISO 27001 Information Security Management Systems. [video] Available at: <https://www.youtube.com/watch?v=LytISQyhQVE> [Accessed 15 May 2018].

  • Website

    Bevan, O., Ganguly, S., Kaminski, P. and Rezek, C.

    ‘The ghost in the machine’: Managing technology risk

    2016

    In-text: (Bevan, Ganguly, Kaminski and Rezek, 2016)

    Your Bibliography: Bevan, O., Ganguly, S., Kaminski, P. and Rezek, C., 2016. ‘The ghost in the machine’: Managing technology risk. [online] McKinsey & Company. Available at: <https://www.mckinsey.com/business-functions/risk/our-insights/the-ghost-in-the-machine-managing-technology-risk> [Accessed 13 May 2018].

  • Report

    British Standards Institution

    ISO/IEC 27001:2013 Your implementation guide

    2013 - British Standards Institution

    In-text: (British Standards Institution, 2013)

    Your Bibliography: British Standards Institution, 2013. ISO/IEC 27001:2013 Your implementation guide. [online] British Standards Institution. Available at: <https://www-bsigroup-com.liverpool.idm.oclc.org/LocalFiles/en-IE/27001/resources/ISO-27001-implementation-guide.pdf> [Accessed 15 May 2018].

  • Book

    Calder, A. and Watkins, S.

    IT governance

    2015 - Kogan Page - London

    In-text: (Calder and Watkins, 2015)

    Your Bibliography: Calder, A. and Watkins, S., 2015. IT governance. 6th ed. London: Kogan Page.

  • Report

    International Organization for Standards

    Risk Management Vocabulay

    2009 - ISO - Geneva

    In-text: (International Organization for Standards, 2009)

    Your Bibliography: International Organization for Standards, 2009. Risk Management Vocabulay. ISO Guide 73:2009. [online] Geneva: ISO. Available at: <https://www.iso.org/standard/44651.html> [Accessed 16 May 2018].

  • Book

    Kohnke, A., Shoemaker, D. and Sigler, K.

    The complete guide to cybersecurity risks and controls

    2016 - Taylor and Francis Group LLC - Boca Raton

    In-text: (Kohnke, Shoemaker and Sigler, 2016)

    Your Bibliography: Kohnke, A., Shoemaker, D. and Sigler, K., 2016. The complete guide to cybersecurity risks and controls. Boca Raton: Taylor and Francis Group LLC.

  • Book

    Kouns, J. and Minoli, D.

    Information Technology Risk Management in Enterprise Environments

    2010 - Wiley - Somerset

    In-text: (Kouns and Minoli, 2010)

    Your Bibliography: Kouns, J. and Minoli, D., 2010. Information Technology Risk Management in Enterprise Environments. 1st ed. Somerset: Wiley.

  • Conference proceedings

    Nawir, M., Amir, A. and Yaakob, N.

    Internet of Things (IoT): Taxonomy of security attacks

    2016 - IEEE - Phuket

    In-text: (Nawir, Amir and Yaakob, 2016)

    Your Bibliography: Nawir, M., Amir, A. and Yaakob, N., 2016. Internet of Things (IoT): Taxonomy of security attacks. In: Electronic Design (ICED), 2016 3rd International Conference on. [online] Phuket: IEEE. Available at: <https://ieeexplore.ieee.org/document/7804660/> [Accessed 14 May 2018].

  • Journal

    Pironti, J. P.

    2018

    In-text: (Pironti, 2018)

    Your Bibliography: Pironti, J., 2018. .

  • Book

    Pompon, R.

    IT Security Risk Control Management

    2016 - Apress - Berkeley, CA

    In-text: (Pompon, 2016)

    Your Bibliography: Pompon, R., 2016. IT Security Risk Control Management. Berkeley, CA: Apress.

  • Report

    Ponemone Institute

    The Evolving Role of CISOs and their Importance to the Business

    2017 - Ponemon Institute LLC

    In-text: (Ponemone Institute, 2017)

    Your Bibliography: Ponemone Institute, 2017. The Evolving Role of CISOs and their Importance to the Business. [online] Ponemon Institute LLC, pp.10 - 12. Available at: <https://interact.f5.com/rs/653-SMC-783/images/RPRT-SEC-1167223548-global-ciso-benchmarkUPDATED.pdf> [Accessed 15 May 2018].

  • Website

    Tarala, J.

    Implementing the 20 Critical Controls with Security Information and Event Management (SIEM) Systems

    2011 - SANS Institute

    In-text: (Tarala, 2011)

    Your Bibliography: Tarala, J., 2011. Implementing the 20 Critical Controls with Security Information and Event Management (SIEM) Systems. [online] Uk.sans.org. Available at: <https://uk.sans.org/reading-room/whitepapers/analyst/implementing-20-critical-controls-security-information-event-management-siem-systems-34965> [Accessed 15 May 2018].

  • Website

    Tarala, J.

    Risk Management with James Tarala in SANS MGT415

    2015 - SANS Institute

    In-text: (Tarala, 2015)

    Your Bibliography: Tarala, J., 2015. Risk Management with James Tarala in SANS MGT415. [online] SANS Security Awareness. Available at: <https://www.sans.org/security-awareness-training/blog/risk-management-james-tarala-sans-mgt415> [Accessed 12 May 2018].

  • Website

    Risk appetite and tolerance

    2018 - Institute Of Risk Management

    In-text: (Risk appetite and tolerance, 2018)

    Your Bibliography: Theirm.org. 2018. Risk appetite and tolerance. [online] Available at: <https://www.theirm.org/knowledge-and-resources/thought-leadership/risk-appetite-and-tolerance.aspx> [Accessed 10 May 2018].

  • Website

    Risk culture

    2018 - The Institute of Risk Management

    In-text: (Risk culture, 2018)

    Your Bibliography: Theirm.org. 2018. Risk culture. [online] Available at: <https://www.theirm.org/knowledge-and-resources/thought-leadership/risk-culture.aspx> [Accessed 15 May 2018].

  • Website

    Van Impe, K.

    Simplifying Risk Management

    2017

    In-text: (Van Impe, 2017)

    Your Bibliography: Van Impe, K., 2017. Simplifying Risk Management. [online] Security Intelligence. Available at: <https://securityintelligence.com/simplifying-risk-management/> [Accessed 17 May 2018].

  • Website

    Veltsos, C.

    NACD Publishes Five Cybersecurity Principles For Board Directors

    2017

    In-text: (Veltsos, 2017)

    Your Bibliography: Veltsos, C., 2017. NACD Publishes Five Cybersecurity Principles For Board Directors. [online] Security Intelligence. Available at: <https://securityintelligence.com/nacd-publishes-five-cybersecurity-principles-every-board-director-needs-to-know/> [Accessed 13 May 2018].

  • Website

    Veltsos, C.

    Putting the 'I' in CISO: The Security Leader Must Become an Influencer

    2018

    In-text: (Veltsos, 2018)

    Your Bibliography: Veltsos, C., 2018. Putting the 'I' in CISO: The Security Leader Must Become an Influencer. [online] Security Intelligence. Available at: <https://securityintelligence.com/putting-the-i-in-ciso-why-the-security-leader-must-become-an-influencer/> [Accessed 13 May 2018].

  • Website

    Veltsos, C.

    10 Takeaways From the ISO 31000:2018 Risk Management Guidelines

    2018

    In-text: (Veltsos, 2018)

    Your Bibliography: Veltsos, C., 2018. 10 Takeaways From the ISO 31000:2018 Risk Management Guidelines. [online] Security Intelligence. Available at: <https://securityintelligence.com/10-takeaways-from-the-iso-310002018-risk-management-guidelines/> [Accessed 13 May 2018].

  • Report

    Wellington Research

    2018 Cyber Security Spend

    2018 - Wellington Research

    In-text: (Wellington Research, 2018)

    Your Bibliography: Wellington Research, 2018. 2018 Cyber Security Spend. [online] Wellington Research. Available at: <https://www.wellingtonresearch.com/wp-content/uploads/2018/05/2018-Cyber-Security-Spend-WR-9May2018.pdf> [Accessed 14 May 2018].

  • Website

    Wurzler, J.

    Information Risks & Risk Management

    2013 - SANS Institute

    In-text: (Wurzler, 2013)

    Your Bibliography: Wurzler, J., 2013. Information Risks & Risk Management. [online] Sans.org. Available at: <https://www.sans.org/reading-room/whitepapers/dlp/information-risks-risk-management-34210> [Accessed 15 May 2018].

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Quick and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use plagiarism checker
  • ✔ Create and edit multiple bibliographies
Join