Richard Seiersen

San Francisco, California, United States Contact Info
17K followers 500+ connections

Join to view profile

About

I'm focused on cybersecurity risk management – as a modern enterprise practice and…

Articles by Richard

See all articles

Activity

Join now to see all activity

Experience & Education

  • Qualys

View Richard’s full experience

See their title, tenure and more.

or

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Licenses & Certifications

  • CISSP

    -

  • CREA

    -

  • GSNA

    -

Publications

  • The Metrics Manifesto

    Wiley

    The Metrics Manifesto: Confronting Security with Data delivers an examination of security metrics with R, the popular open-source programming language and software development environment for statistical computing. This insightful and up-to-date guide offers readers a practical focus on applied measurement that can prove or disprove the efficacy of information security measures taken by a firm.

    The book’s detailed chapters combine topics like security, predictive analytics, and R…

    The Metrics Manifesto: Confronting Security with Data delivers an examination of security metrics with R, the popular open-source programming language and software development environment for statistical computing. This insightful and up-to-date guide offers readers a practical focus on applied measurement that can prove or disprove the efficacy of information security measures taken by a firm.

    The book’s detailed chapters combine topics like security, predictive analytics, and R programming to present an authoritative and innovative approach to security metrics. The author examines historical and modern methods of measurement with a particular emphasis on Bayesian Data Analysis to shed light on measuring security operations.

    See publication
  • How To Measure Anything In Cybersecurity Risk

    Wiley

    How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current "risk management" practices, and offers a series of improvement techniques that help you fill the holes and ramp up security. In his bestselling book How to Measure Anything, author Douglas W. Hubbard opened the business world's eyes to the critical need for better measurement. This book expands upon that premise and draws from The Failure of Risk Management to sound the alarm in the cybersecurity realm. Some of…

    How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current "risk management" practices, and offers a series of improvement techniques that help you fill the holes and ramp up security. In his bestselling book How to Measure Anything, author Douglas W. Hubbard opened the business world's eyes to the critical need for better measurement. This book expands upon that premise and draws from The Failure of Risk Management to sound the alarm in the cybersecurity realm. Some of the field's premier risk management approaches actually create more risk than they mitigate, and questionable methods have been duplicated across industries and embedded in the products accepted as gospel. This book sheds light on these blatant risks, and provides alternate techniques that can help improve your current situation. You'll also learn which approaches are too risky to save, and are actually more damaging than a total lack of any security.

    Dangerous risk management methods abound; there is no industry more critically in need of solutions than cybersecurity. This book provides solutions where they exist, and advises when to change tracks entirely.

    Discover the shortcomings of cybersecurity's "best practices"
    Learn which risk management approaches actually create risk
    Improve your current practices with practical alterations
    Learn which methods are beyond saving, and worse than doing nothing
    Insightful and enlightening, this book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection, so finding cracks in the vault is a positive thing—as long as you get there before the bad guys do. How to Measure Anything in Cybersecurity Risk is your guide to more robust protection through better quantitative processes, approaches, and techniques.

    Other authors
    See publication

Honors & Awards

  • ISE North America Security Project Of The Year in Healthcare

    ISE

    Operational Risk Management (ORM) is an web services based framework that applies business intelligence to the IT security domain. ORM's focus is prioritizing the treatment of unmitigated residual risk in relationship to defined risk tolerances against massive enterprise data sets.

Recommendations received

8 people have recommended Richard

Join now to view

More activity by Richard

View Richard’s full profile

  • See who you know in common
  • Get introduced
  • Contact Richard directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Richard Seiersen

1 other named Richard Seiersen is on LinkedIn

See others named Richard Seiersen

Add new skills with these courses