Project Risk Management


Book Description

Based on sound conceptual foundations yet developed to meet practical concerns, Project Risk Management has become recognized as a standard work on its subject. It sets out the key issues and concepts involved in effective risk and uncertainty management in a clear and accessible way, providing a comprehensive discussion of risk management processes set firmly in the context of the project management task as a whole and focused on improving performance.




Safety and Health for Engineers


Book Description

SAFETY AND HEALTH FOR ENGINEERS A comprehensive resource for making products, facilities, processes, and operations safe for workers, users, and the public Ensuring the health and safety of individuals in the workplace is vital on an interpersonal level but is also crucial to limiting the liability of companies in the event of an onsite injury. The Bureau of Labor Statistics reported over 4,700 fatal work injuries in the United States in 2020, most frequently in transportation-related incidents. The same year, approximately 2.7 million workplace injuries and illnesses were reported by private industry employers. According to the National Safety Council, the cost in lost wages, productivity, medical and administrative costs is close to 1.2 trillion dollars in the US alone. It is imperative—by law and ethics—for engineers and safety and health professionals to drive down these statistics by creating a safe workplace and safe products, as well as maintaining a safe environment. Safety and Health for Engineers is considered the gold standard for engineers in all specialties, teaching an understanding of many components necessary to achieve safe workplaces, products, facilities, and methods to secure safety for workers, users, and the public. Each chapter offers information relevant to help safety professionals and engineers in the achievement of the first canon of professional ethics: to protect the health, safety, and welfare of the public. The textbook examines the fundamentals of safety, legal aspects, hazard recognition and control, the human element, and techniques to manage safety decisions. In doing so, it covers the primary safety essentials necessary for certification examinations for practitioners. Readers of the fourth edition of Safety and Health for Engineers readers will also find: Updates to all chapters, informed by research and references gathered since the last publication The most up-to-date information on current policy, certifications, regulations, agency standards, and the impact of new technologies, such as wearable technology, automation in transportation, and artificial intelligence New international information, including U.S. and foreign standards agencies, professional societies, and other organizations worldwide Expanded sections with real-world applications, exercises, and 164 case studies An extensive list of references to help readers find more detail on chapter contents A solution manual available to qualified instructors Safety and Health for Engineers is an ideal textbook for courses in safety engineering around the world in undergraduate or graduate studies, or in professional development learning. It also is a useful reference for professionals in engineering, safety, health, and associated fields who are preparing for credentialing examinations in safety and health.




Safety and Security of Cyber-Physical Systems


Book Description

Cyber-physical systems (CPSs) consist of software-controlled computing devices communicating with each other and interacting with the physical world through sensors and actuators. Because most of the functionality of a CPS is implemented in software, the software is of crucial importance for the safety and security of the CPS. This book presents principle-based engineering for the development and operation of dependable software. The knowledge in this book addresses organizations that want to strengthen their methodologies to build safe and secure software for mission-critical cyber-physical systems. The book: • Presents a successful strategy for the management of vulnerabilities, threats, and failures in mission-critical cyber-physical systems; • Offers deep practical insight into principle-based software development (62 principles are introduced and cataloged into five categories: Business & organization, general principles, safety, security, and risk management principles); • Provides direct guidance on architecting and operating dependable cyber-physical systems for software managers and architects.




Cyber Strategy


Book Description

Cyber Strategy: Risk-Driven Security and Resiliency provides a process and roadmap for any company to develop its unified Cybersecurity and Cyber Resiliency strategies. It demonstrates a methodology for companies to combine their disassociated efforts into one corporate plan with buy-in from senior management that will efficiently utilize resources, target high risk threats, and evaluate risk assessment methodologies and the efficacy of resultant risk mitigations. The book discusses all the steps required from conception of the plan from preplanning (mission/vision, principles, strategic objectives, new initiatives derivation), project management directives, cyber threat and vulnerability analysis, cyber risk and controls assessment to reporting and measurement techniques for plan success and overall strategic plan performance. In addition, a methodology is presented to aid in new initiative selection for the following year by identifying all relevant inputs. Tools utilized include: Key Risk Indicators (KRI) and Key Performance Indicators (KPI) National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF) Target State Maturity interval mapping per initiative Comparisons of current and target state business goals and critical success factors A quantitative NIST-based risk assessment of initiative technology components Responsible, Accountable, Consulted, Informed (RACI) diagrams for Cyber Steering Committee tasks and Governance Boards’ approval processes Swimlanes, timelines, data flow diagrams (inputs, resources, outputs), progress report templates, and Gantt charts for project management The last chapter provides downloadable checklists, tables, data flow diagrams, figures, and assessment tools to help develop your company’s cybersecurity and cyber resiliency strategic plan.







Managing Information Risks


Book Description

Managing Information Risks: Threats, Vulnerabilities, and Responses identifies and categorizes risks related to creation, collection, storage, retention, retrieval, disclosure and ownership of information in organizations of all types and sizes. It is intended for risk managers, information governance specialists, compliance officers, attorneys, records managers, archivists, and other decision-makers, managers, and analysts who are responsible for risk management initiatives related to their organizations’ information assets. An opening chapter defines and discusses risk terminology and concepts that are essential for understanding, assessing, and controlling information risk. Subsequent chapters provide detailed explanations of specific threats to an organization’s information assets, an assessment of vulnerabilities that the threats can exploit, and a review of available options to address the threats and their associated vulnerabilities. Applicable laws, regulations, and standards are cited at appropriate points in the text. Each chapter includes extensive endnotes that support specific points and provide suggestions for further reading. While the book is grounded in scholarship, the treatment is practical rather than theoretical. Each chapter focuses on knowledge and recommendations that readers can use to: heighten risk awareness within their organizations, identify threats and their associated consequences, assess vulnerabilities, evaluate risk mitigation options, define risk-related responsibilities, and align information-related initiatives and activities with their organizations’ risk management strategies and policies. Compared to other works, this book deals with a broader range of information risks and draws on ideas from a greater variety of disciplines, including business process management, law, financial analysis, records management, information science, and archival administration. Most books on this topic associate information risk with digital data, information technology, and cyber security. This book covers risks to information of any type in any format, including paper and photographic records as well as digital content.




The Risk IT Practitioner Guide


Book Description




Risk Management Handbook


Book Description

Every day in the United States, over two million men, women, and children step onto an aircraft and place their lives in the hands of strangers. As anyone who has ever flown knows, modern flight offers unparalleled advantages in travel and freedom, but it also comes with grave responsibility and risk. For the first time in its history, the Federal Aviation Administration has put together a set of easy-to-understand guidelines and principles that will help pilots of any skill level minimize risk and maximize safety while in the air. The Risk Management Handbook offers full-color diagrams and illustrations to help students and pilots visualize the science of flight, while providing straightforward information on decision-making and the risk-management process.




The Complete Guide to Business Risk Management


Book Description

Risk management and contingency planning has really come to the fore since the first edition of this book was originally published. Computer failure, fire, fraud, robbery, accident, environmental damage, new regulations - business is constantly under threat. But how do you determine which are the most important dangers for your business? What can you do to lessen the chances of their happening - and minimize the impact if they do happen? In this comprehensive volume Kit Sadgrove shows how you can identify - and control - the relevant threats and ensure that your company will survive. He begins by asking 'What is risk?', 'How do we assess it?' and 'How can it be managed?' He goes on to examine in detail the key danger areas including finance, product quality, health and safety, security and the environment. With case studies, self-assessment exercises and checklists, each chapter looks systematically at what is involved and enables you to draw up action plans that could, for example, provide a defence in law or reduce your insurance premium. The new edition reflects the changes in the global environment, the new risks that have emerged and the effect of macroeconomic factors on business profitability and success. The author has also included a set of case studies to illustrate his ideas in practice.




The Robotic Process Automation Handbook


Book Description

While Robotic Process Automation (RPA) has been around for about 20 years, it has hit an inflection point because of the convergence of cloud computing, big data and AI. This book shows you how to leverage RPA effectively in your company to automate repetitive and rules-based processes, such as scheduling, inputting/transferring data, cut and paste, filling out forms, and search. Using practical aspects of implementing the technology (based on case studies and industry best practices), you’ll see how companies have been able to realize substantial ROI (Return On Investment) with their implementations, such as by lessening the need for hiring or outsourcing. By understanding the core concepts of RPA, you’ll also see that the technology significantly increases compliance – leading to fewer issues with regulations – and minimizes costly errors. RPA software revenues have recently soared by over 60 percent, which is the fastest ramp in the tech industry, and they are expected to exceed $1 billion by the end of 2019. It is generally seamless with legacy IT environments, making it easier for companies to pursue a strategy of digital transformation and can even be a gateway to AI. The Robotic Process Automation Handbook puts everything you need to know into one place to be a part of this wave. What You'll Learn Develop the right strategy and planDeal with resistance and fears from employeesTake an in-depth look at the leading RPA systems, including where they are most effective, the risks and the costsEvaluate an RPA system Who This Book Is For IT specialists and managers at mid-to-large companies