ISA PUBLICATIONS

ISA’s Most-Read Publications

ISA’s Executive Report (2012)

“The Advanced Persistent Threat: Practical Controls That SMB Leaders Should Consider Implementing,” by ISA (2013)

“Sophisticated Management of Cyber Risk,” by ISA (2013)

“The Financial Management of Cyber Risk: An Implementation Framework for CFOs,” by ISA-ANSI (2010)
The Advanced Persistent Threat (APT) – Practical Controls the SMB Leaders Should Consider Implementing

“The Advanced Persistent Threat: Practical Controls That SMB Leaders Should Consider Implementing,” by ISA (2013)
Financial Risk Management Program Publications

“The Financial Impact of Cyber Risk: 50 Questions Every CFO Should Ask,” by ISA-ANSI (2008)

“The Financial Management of Cyber Risk: An Implementation Framework for CFOs,” by ISA-ANSI (2010)

“The Financial Impact of Breached Protected Health Information: A Business Case for Enhanced PHI Security,” by ISA-ANSI-Santa Fe (2012)

“Sophisticated Management of Cyber Risk,” by ISA (2013)
Public-Private Partnership – ISA’s Incentive-Based Cyber Security “Social Contract”

“The Cyber Security Social Contract: Policy Recommendations for the Obama Administration and 111th Congress,” by ISA (2008)

“Social Contract 2.0: A 21st Century Program for Effective Cyber Security,” by ISA (2010)

“Improving our Nation’s Cybersecurity through the Public-Private Partnership,” Industry-Civil Liberties Community White Paper (March 2011)
Information Sharing – ISA’s Model for Disrupting Attacker Command and Control Channels

“ISA Model for Disrupting Attacker Command and Control Channels,” by Jeff Brown (Raytheon)
Supply Chain – ISA’s Guidelines and Framework for Securing the Electronics Supply Chain

“ISA Framework for Securing the Electronics Supply Chain,” by ISA Project Leader Scott Borg (2009)
 

“The ISA Guidelines for Securing the Electronics Supply Chain,” by ISA Project Leader Scott Borg (2013)

Mobile Security – Navigating Compliance and Security for Unified Communications and Applicability of SCAP to VoIP

“Navigating Compliance and Security for Unified Communications,” by ISA (2009)

“Applicability of SCAP to VoIP Systems – White Paper Draft for Review v.1,” by ISA (2010)

“IP Phone Baseline Security Checklist v0.6a,” by ISA (2010)
Common Sense Guides for Senior Managers, Small Businesses, and Home Users

“Common Sense Guide for Senior Managers,” by ISA (2002)

“Common Sense Guide for Home and Individual Users,” by ISA (2003)

“Common Sense Guide for Small Businesses,” by ISA (2004)
Common Sense Guides to Prevention and Detection of Insider Threats

“Common Sense Guide to Prevention and Detection of Insider Threats: 1st Edition,” by ISA (2005)

“Common Sense Guide to Prevention and Detection of Insider Threats: 2nd Edition,” by ISA (2006)

“Common Sense Guide to Prevention and Detection of Insider Threats: 3rd Edition,” by ISA (2008)
Contracting for Information Security in Commercial Transactions

“Contracting for Information Security in Commercial Transactions: An Intro Guide,” by ISA (2005)

“Contracting for Information Security in Commercial Transactions: Vol. II,” by ISA (2007)
Risk Management – Outsourcing and E-Discovery

Enterprise Risk Integration Program – E-Discovery Risk Management: Vol. 1, No. 2,” (March 2007)

Enterprise Risk Integration Program – Outsourcing Risk Management: Vol. 1, No. 1,” (November 2006)