Skip to main content
Mobile
  • Finance, Accounting & Economics
  • Global Business Management
  • Management, Leadership & Organisation
  • Marketing & Sales
  • Strategy
  • Technology & Operations
HS Talks HS Talks
Subjects  
Search
  • Notifications
    Notifications

    No current notifications.

  • User
    Welcome Guest
    You have Limited Access The Business & Management Collection
    Login
    Get Assistance
    Login
    Forgot your password?
    Login via your organisation
    Login via Organisation
    Get Assistance
Finance, Accounting & Economics
Global Business Management
Management, Leadership & Organisation
Marketing & Sales
Strategy
Technology & Operations
Practice paper

Utilising information security to improve resilience

Jennifer Bayuk and Kenneth Silverstein
Journal of Business Continuity & Emergency Planning, 2 (1), 7-12 (2007)
https://doi.org/10.69554/KVRQ4052

Abstract

When it comes to cyber-related events, the information security professional plays the same role as the business recovery professional. The more the business process recovery professional is closely tied to information security activities within the organisation, the more influence they will have on the development of information security countermeasures. This influence will allow these countermeasures to be better suited to the needs of the business process recovery programme. While the business recovery processes and the information security processes may, in most cases, be separate and distinct, it is vital that they be linked in order to provide the greatest level of resiliency. This paper will provide the framework for how to plan and address the effects of cyber-attacks to technology systems. In addition, the paper will also discuss the role of the information security professional in non-cyberrelated events. In all events, it is vital that the role of information security be incorporated in the organisation’s business recovery processes.

Keywords: information security resiliency; information security business continuity; information security business continuity planning (BCP)

The full article is available to subscribers to the journal.

Already a subscriber? Login or review other options.

Author's Biography

Jennifer Bayuk is the Chief Information Security Officer for Bear Stearns & Co., Inc. She is responsible for information security policy, process, management and metrics. Jennifer has been a manager of information systems audit, a security consultant and auditor, and security software engineer at AT&T Bell Laboratories. She has written on information security and audit topics ranging from security process management to client/server application controls, including two textbooks for the Information Systems Audit and Control Association. She chairs the SIFMA Information Security Subcommittee and the FSSCC Technology R&D committee. She has lectured for organisations such as ISACA, NIST and CSI. She is a Certified Information Security Auditor, and Certified Security Information Manager. She has masters degrees in computer science and philosophy.

Kenneth Silverstein is currently Senior Managing Director in Operations Administration at Bear Stearns & Co. Ken is currently responsible for coordinating the business continuity activities of Bear Stearns. He has been with Bear Stearns for over 24 years and has extensive experience in the financial services industry. Prior to Bear Stearns, Mr Silverstein was an auditor for Coopers & Lybrand. Mr Silverstein is Chairman of the Security Industry and Financial Markets Association (SIFMA) Business Continuity Planning Committee. Mr Silverstein received his BBA from the University of Massachusetts and his MBA from New York University.

Citation

Bayuk, Jennifer and Silverstein, Kenneth (2007, October 1). Utilising information security to improve resilience. In the Journal of Business Continuity & Emergency Planning, Volume 2, Issue 1. https://doi.org/10.69554/KVRQ4052.

Options

  • Download PDF
  • Share this page
    Share This Article
    Messaging
    • Outlook
    • Gmail
    • Yahoo!
    • WhatsApp
    Social
    • Facebook
    • X
    • LinkedIn
    • VKontakte
    Permalink
cover image, Journal of Business Continuity & Emergency Planning
Journal of Business Continuity & Emergency Planning
Volume 2 / Issue 1
© Henry Stewart
Publications LLP

The Business & Management Collection

  • ISSN: 2059-7177
  • Contact Us
  • Request Free Trial
  • Recommend to Your Librarian
  • Subscription Information
  • Match Content
  • Share This Collection
  • Embed Options
  • View Quick Start Guide
  • Accessibility

Categories

  • Finance, Accounting & Economics
  • Global Business Management
  • Management, Leadership & Organisation
  • Marketing & Sales
  • Strategy
  • Technology & Operations

Librarian Information

  • General Information
  • MARC Records
  • Discovery Services
  • Onsite & Offsite Access
  • Federated (Shibboleth) Access
  • Usage Statistics
  • Promotional Materials
  • Testimonials

About Us

  • About HSTalks
  • Editors
  • Contact Information
  • About the Journals

HSTalks Home

Follow Us On:

HS Talks
  • Site Requirements
  • Copyright & Permissions
  • Terms
  • Privacy
  • Sitemap
© Copyright Henry Stewart Talks Ltd

Personal Account Required

To use this function, you need to be signed in with a personal account.

If you already have a personal account, please login here.

Otherwise you may sign up now for a personal account.

HS Talks

Cookies and Privacy

We use cookies, and similar tools, to improve the way this site functions, to track browsing patterns and enable marketing. For more information read our cookie policy and privacy policy.

Cookie Settings

How Cookies Are Used

Cookies are of the following types:

  • Essential to make the site function.
  • Used to analyse and improve visitor experience.

For more information see our Cookie Policy.

Some types of cookies can be disabled by you but doing so may adversely affect functionality. Please see below:

(always on)

If you block these cookies or set alerts in your browser parts of the website will not work.

Cookies that provide enhanced functionality and personalisation. If not allowed functionality may be impaired.

Cookies that count and track visits and on website activity enabling us to organise the website to optimise the experience of users. They may be blocked without immediate adverse effect.