| ISA’s Most-Read Publications |

“The Cyber Security Social Contract: Policy Recommendations for the Obama Administration and 111th Congress,” by ISA (2008) |

“Social Contract 2.0: A 21st Century Program for Effective Cyber Security,” by ISA (2010) |

“The Financial Impact of Cyber Risk: 50 Questions Every CFO Should Ask,” by ISA-ANSI (2008) |

“The Financial Management of Cyber Risk: An Implementation Framework for CFOs,” by ISA-ANSI (2010) |
| Financial Risk Management Program Publications |

“The Financial Impact of Cyber Risk: 50 Questions Every CFO Should Ask,” by ISA-ANSI (2008) |

“The Financial Management of Cyber Risk: An Implementation Framework for CFOs,” by ISA-ANSI (2010) |

“The Financial Impact of Breached Protected Health Information: A Business Case for Enhanced PHI Security,” by ISA-ANSI-Santa Fe (2012) |
|
| Public-Private Partnership – ISA’s Incentive-Based Cyber Security “Social Contract” |

“The Cyber Security Social Contract: Policy Recommendations for the Obama Administration and 111th Congress,” by ISA (2008) |

“Social Contract 2.0: A 21st Century Program for Effective Cyber Security,” by ISA (2010) |

“Improving our Nation’s Cybersecurity through the Public-Private Partnership,” Industry-Civil Liberties Community White Paper (March 2011) |
|
| Information Sharing – ISA’s Model for Disrupting Attacker Command and Control Channels |

“ISA Model for Disrupting Attacker Command and Control Channels,” by Jeff Brown (Raytheon) |
|
|
|
| Supply Chain – ISA’s Framework for Securing the Electronics Supply Chain |

“ISA Framework for Securing the Electronics Supply Chain,” by ISA Project Leader Scott Borg (2009) |
|
|
|
| Mobile Security – Navigating Compliance and Security for Unified Communications and Applicability of SCAP to VoIP |

“Navigating Compliance and Security for Unified Communications,” by ISA (2009) |

“Applicability of SCAP to VoIP Systems – White Paper Draft for Review v.1,” by ISA (2010) |

“IP Phone Baseline Security Checklist v0.6a,” by ISA (2010) |
|
| Common Sense Guides for Senior Managers, Small Businesses, and Home Users |

“Common Sense Guide for Senior Managers,” by ISA (2002) |

“Common Sense Guide for Home and Individual Users,” by ISA (2003) |

“Common Sense Guide for Small Businesses,” by ISA (2004) |
|
| Common Sense Guides to Prevention and Detection of Insider Threats |

“Common Sense Guide to Prevention and Detection of Insider Threats: 1st Edition,” by ISA (2005) |

“Common Sense Guide to Prevention and Detection of Insider Threats: 2nd Edition,” by ISA (2006) |

“Common Sense Guide to Prevention and Detection of Insider Threats: 3rd Edition,” by ISA (2008) |
|
| Contracting for Information Security in Commercial Transactions |

“Contracting for Information Security in Commercial Transactions: An Intro Guide,” by ISA (2005) |

“Contracting for Information Security in Commercial Transactions: Vol. II,” by ISA (2007) |
|
|
| Risk Management – Outsourcing and E-Discovery |

Enterprise Risk Integration Program – E-Discovery Risk Management: Vol. 1, No. 2,” (March 2007) |

Enterprise Risk Integration Program – Outsourcing Risk Management: Vol. 1, No. 1,” (November 2006) |
|
|