These are the sources and citations used to research week 7. This bibliography was generated on Cite This For Me on
In-text: (A structured approach to Enterprise Risk Management (ERM) and the requirements of ISO 31000, 2010)
Your Bibliography: 2010. A structured approach to Enterprise Risk Management (ERM) and the requirements of ISO 31000. 1st ed. [ebook] Available at: <https://www.theirm.org/media/886062/ISO3100_doc.pdf> [Accessed 15 May 2018].
In-text: (Beginners ultimate guide to ISO 27001 Information Security Management Systems, 2017)
Your Bibliography: 2017. Beginners ultimate guide to ISO 27001 Information Security Management Systems. [video] Available at: <https://www.youtube.com/watch?v=LytISQyhQVE> [Accessed 15 May 2018].
In-text: (Bevan, Ganguly, Kaminski and Rezek, 2016)
Your Bibliography: Bevan, O., Ganguly, S., Kaminski, P. and Rezek, C., 2016. ‘The ghost in the machine’: Managing technology risk. [online] McKinsey & Company. Available at: <https://www.mckinsey.com/business-functions/risk/our-insights/the-ghost-in-the-machine-managing-technology-risk> [Accessed 13 May 2018].
In-text: (British Standards Institution, 2013)
Your Bibliography: British Standards Institution, 2013. ISO/IEC 27001:2013 Your implementation guide. [online] British Standards Institution. Available at: <https://www-bsigroup-com.liverpool.idm.oclc.org/LocalFiles/en-IE/27001/resources/ISO-27001-implementation-guide.pdf> [Accessed 15 May 2018].
In-text: (Calder and Watkins, 2015)
Your Bibliography: Calder, A. and Watkins, S., 2015. IT governance. 6th ed. London: Kogan Page.
In-text: (International Organization for Standards, 2009)
Your Bibliography: International Organization for Standards, 2009. Risk Management Vocabulay. ISO Guide 73:2009. [online] Geneva: ISO. Available at: <https://www.iso.org/standard/44651.html> [Accessed 16 May 2018].
In-text: (Kohnke, Shoemaker and Sigler, 2016)
Your Bibliography: Kohnke, A., Shoemaker, D. and Sigler, K., 2016. The complete guide to cybersecurity risks and controls. Boca Raton: Taylor and Francis Group LLC.
In-text: (Kouns and Minoli, 2010)
Your Bibliography: Kouns, J. and Minoli, D., 2010. Information Technology Risk Management in Enterprise Environments. 1st ed. Somerset: Wiley.
In-text: (Nawir, Amir and Yaakob, 2016)
Your Bibliography: Nawir, M., Amir, A. and Yaakob, N., 2016. Internet of Things (IoT): Taxonomy of security attacks. In: Electronic Design (ICED), 2016 3rd International Conference on. [online] Phuket: IEEE. Available at: <https://ieeexplore.ieee.org/document/7804660/> [Accessed 14 May 2018].
In-text: (Pironti, 2018)
Your Bibliography: Pironti, J., 2018. .
In-text: (Pompon, 2016)
Your Bibliography: Pompon, R., 2016. IT Security Risk Control Management. Berkeley, CA: Apress.
In-text: (Ponemone Institute, 2017)
Your Bibliography: Ponemone Institute, 2017. The Evolving Role of CISOs and their Importance to the Business. [online] Ponemon Institute LLC, pp.10 - 12. Available at: <https://interact.f5.com/rs/653-SMC-783/images/RPRT-SEC-1167223548-global-ciso-benchmarkUPDATED.pdf> [Accessed 15 May 2018].
In-text: (Tarala, 2011)
Your Bibliography: Tarala, J., 2011. Implementing the 20 Critical Controls with Security Information and Event Management (SIEM) Systems. [online] Uk.sans.org. Available at: <https://uk.sans.org/reading-room/whitepapers/analyst/implementing-20-critical-controls-security-information-event-management-siem-systems-34965> [Accessed 15 May 2018].
In-text: (Tarala, 2015)
Your Bibliography: Tarala, J., 2015. Risk Management with James Tarala in SANS MGT415. [online] SANS Security Awareness. Available at: <https://www.sans.org/security-awareness-training/blog/risk-management-james-tarala-sans-mgt415> [Accessed 12 May 2018].
In-text: (Risk appetite and tolerance, 2018)
Your Bibliography: Theirm.org. 2018. Risk appetite and tolerance. [online] Available at: <https://www.theirm.org/knowledge-and-resources/thought-leadership/risk-appetite-and-tolerance.aspx> [Accessed 10 May 2018].
In-text: (Risk culture, 2018)
Your Bibliography: Theirm.org. 2018. Risk culture. [online] Available at: <https://www.theirm.org/knowledge-and-resources/thought-leadership/risk-culture.aspx> [Accessed 15 May 2018].
In-text: (Van Impe, 2017)
Your Bibliography: Van Impe, K., 2017. Simplifying Risk Management. [online] Security Intelligence. Available at: <https://securityintelligence.com/simplifying-risk-management/> [Accessed 17 May 2018].
In-text: (Veltsos, 2017)
Your Bibliography: Veltsos, C., 2017. NACD Publishes Five Cybersecurity Principles For Board Directors. [online] Security Intelligence. Available at: <https://securityintelligence.com/nacd-publishes-five-cybersecurity-principles-every-board-director-needs-to-know/> [Accessed 13 May 2018].
In-text: (Veltsos, 2018)
Your Bibliography: Veltsos, C., 2018. Putting the 'I' in CISO: The Security Leader Must Become an Influencer. [online] Security Intelligence. Available at: <https://securityintelligence.com/putting-the-i-in-ciso-why-the-security-leader-must-become-an-influencer/> [Accessed 13 May 2018].
In-text: (Veltsos, 2018)
Your Bibliography: Veltsos, C., 2018. 10 Takeaways From the ISO 31000:2018 Risk Management Guidelines. [online] Security Intelligence. Available at: <https://securityintelligence.com/10-takeaways-from-the-iso-310002018-risk-management-guidelines/> [Accessed 13 May 2018].
In-text: (Wellington Research, 2018)
Your Bibliography: Wellington Research, 2018. 2018 Cyber Security Spend. [online] Wellington Research. Available at: <https://www.wellingtonresearch.com/wp-content/uploads/2018/05/2018-Cyber-Security-Spend-WR-9May2018.pdf> [Accessed 14 May 2018].
In-text: (Wurzler, 2013)
Your Bibliography: Wurzler, J., 2013. Information Risks & Risk Management. [online] Sans.org. Available at: <https://www.sans.org/reading-room/whitepapers/dlp/information-risks-risk-management-34210> [Accessed 15 May 2018].
10,587 students joined last month!