to learn more about MatthewRosenquist, share content, and exchange messages and invites.
Not a member? Join Now!
to create and rate content, and to follow, bookmark, and share content with other members. Not a member? Join Now!
This whitepaper describes the Threat Agent Risk Assessment (TARA) methodology that distills the immense number of possible information security attacks into a digest of only those exposures most likely to occur. This ... Whitepaper: Prioritizing Information Security Risks with Threat Agent Risk AssessmentBack Opinion paper by Matthew Rosenquist 2009 - Information technology has lagged behind society’s skyrocketing need to manage and secure data. Information is growing exponentially and our demands for control and oversigh... It is Time for a Data Security Revolution!Back The security industry has spent an inordinate amount of effort focusing on defense against vulnerabilities. But there are other opportunities. Back Don't assume people will read the security policy! Just because the policy is posted, does not mean everyone will read it. Information Security policy must be marketed to employeesBack Can security be detrimental to an organization? Absolutely! Being aware security programs may become the source of losses and introduce more risk is important for establishing and maintaining a valuable security c... The Dark Side of SecurityBack Intel IT developed a model for measuring Return on Security Investment (ROSI) in our manufacturing environments that produces a much higher level of accuracy than other methods currently available. Our model has enab... Measuring the Return on IT Security InvestmentsBack