You are currently browsing the tag archive for the ‘security’ tag.
David Hillson shows how two simple extensions to the standard risk process can bridge the gap between tactics and strategy, ensuring that risk management delivers benefits to the wider organisation. This free Webinar was recorded for the PMI International Development Community of Practice (PMI ID CoP) in March 2012.
View the Webinar here.
David has published an array of books with Gower Publishing, focussing on risk, a full of list of titles can be found here www.gowerpublishing.com/risk-attitude.
In our everyday lives we use our debit cards, credit cards and drivers licence on a regular basis to buy things, prove our age or to show we are legal to drive. Our name is listed on all of these documents but we don’t actually need it. The only people who benefit from our names being present on these cards are identity thieves. Gower author, David Birch, explains in his seminar what needs to be done in order for us to keep our identities protected and safe.
David’s book, Digital Identity Management is available from Gower.
Ian will be presenting at the event in the Business Strategy Theatre at 12pm on Thursday 26th April with the headline of Social Engineering IX – Hacking the Globe – a snappy little title, that sets the theme for an examination of cultural differences that impact on the task of the social engineer. This is the result of his social engineering work across a number of continents.
Do pop in and see Ian on the ECSC stand at any time during the three days - he will be doing regular short presentations each day. ECSC are vendor independent information security specialists offering expert guidance, support and management services.
Ian’s book, Hacking the Human is available from Gower Publishing.
Gower author, Catherine Truel, writes a monthly blog for Supply Chain Asia Magazine covering topics surrounding Customs Management. Her latest post Shipping from East Asia to Europe by land – can central Asia be integrated into the global supply chain? is now live.
We usually focus specifically on our authors and editors in this blog. The following is the first of a series of posts over the coming couple of months, designed to give you a sense of our publishing in 2011.
Gower Publishing on Fraud, Risk and Security in 2011
There are several themes to our fraud, risk and security publishing through 2011 and into 2012.
Fraud and corporate crime: You can see a continuing focus on fraud and corporate crime with titles such as Kimberly Goetz’s An Introduction to Internet-Based Financial Investigations; The Anatomy of Fraud and Corruption by Tomas Brytting, Richard Minogue and Veronica Morino; a brand new Gower Handbook, The Handbook of Fraud Investigation and Prevention, edited by Alan Doig; and a look at a very specific aspect of fraud with Bernard Katz’s Detecting and Reducing Supply Chain Fraud.
Strategic risk: I think there’s an increased focus on strategic risk too, with books such as Gabrielle O’Donovan’s Solvency II: Stakeholder Communications and Change; Adrian Davies’ third book for Gower, Culture Clash and the Challenge of Globalisation, which looks ahead at the future for corporate governance; and Vicky Kubitscheck’s Integrated Assurance. Strategic risk is a theme behind many of the new titles in the Short Guides to Business Risk Series. With titles on Equality Risk (Tony Morden), Cartel Risk (Helen Bignall and John Pheasant) Compliance Risk, (Carl Macrae and Amelie Snape) amongst others, as well as David Tattam’s Short Guide to Operational Risk – not strategic, I grant you, but an excellent guide, nevertheless.
Risk facilitation and investigation: The final titles I’d like to highlight are Penny Pullen and Ruth Murray-Webster’s A Short Guide to Facilitating Risk Management and Crawford Robinson’s Investigations at Work; both intensely practical, practitioner-oriented books.
In this chapter, Doug Hopton looks at Customer Due Diligence he says ‘CDD is frequently misunderstood – to many people CDD only means the process of identification and verification of a new customer or client (that is, ID&V). This, of course, is not just the case. ID&V is the start of the CDD process. CDD is therefore essential not only to identify your new customers but to ensure that you do not establish relationships with anyone on a UN sanction list or similar.’ So he starts by asking ‘What is CDD?’
The following has been one of the more popular chapters downloaded on our website and so I thought you’d like to see it here also.
In understanding and protecting ourselves from social engineering attacks, it is important that we understand where the limits of trust should lie. Read the full chapter here.
Ian Mann is the author of Hacking the Human