LEADER 03641nam 22004935 450 001 9910254561903321 005 20200706072820.0 010 $a1-4842-3099-X 024 7 $a10.1007/978-1-4842-3099-2 035 $a(CKB)4100000001382169 035 $a(DE-He213)978-1-4842-3099-2 035 $a(MiAaPQ)EBC5191287 035 $a(CaSebORM)9781484230992 035 $a(PPN)22223105X 035 $a(OCoLC)1076922282 035 $a(OCoLC)on1076922282 035 $a(EXLCZ)994100000001382169 100 $a20171207d2017 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAchieving and Sustaining Secured Business Operations $eAn Executive?s Guide to Planning and Management /$fby Neelesh Ajmani, Dinesh Kumar 205 $a1st ed. 2017. 210 1$aBerkeley, CA :$cApress :$cImprint: Apress,$d2017. 215 $a1 online resource (XVIII, 168 p. 39 illus. in color.) 311 $a1-4842-3098-1 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $aChapter 1: Current Practices -- Chapter 2: Next Practices: Business Centric Security and Risk Management -- Chapter 3: Secured Business Model -- Chapter 4: Secured Operating Model -- Chapter 5: Secured Management Model -- Chapter 6: Securing Effectiveness -- Chapter 7: Making It Real.- . 330 $aProactively plan and manage innovation in your business while keeping operations safe and secure. This book provides a framework and practices to help you safeguard customer information, prevent unauthorized access, and protect your brand and assets. Securing company operations is a board-level discussion. Across all industries, companies are pouring millions of dollars into taming cybercrime and other related security crime. Achieving and Sustaining Secured Business Operations presents a holistic approach looking top down, bottom up, and sideways. The end goal is to achieve and sustain a safe environment to conduct secured business operations while continuously innovating for competitive advantage. What You?ll Learn: Discover why security, specifically secured business operations, needs to be part of business planning and oversight by design and not left to technologists to make the business case Determine what you can do in your role and in your organization to drive and implement integration and improvements in planning and managing secured business operations in conjunction with other business planning and management activities Choose ways in which progress toward achieving and sustaining secured business operations can be measured Understand best practices for organizing, planning, architecting, governing, monitoring, and managing secured business operations Create a framework, including methods and tools for operationalizing assessment, planning, and ongoing management of secured business operations Use cases and potential case studies for various industries and business models. 606 $aComputer security 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 615 0$aComputer security. 615 14$aSystems and Data Security. 676 $a005.8 700 $aAjmani$b Neelesh$4aut$4http://id.loc.gov/vocabulary/relators/aut$0900658 702 $aKumar$b Dinesh$4aut$4http://id.loc.gov/vocabulary/relators/aut 801 0$bUMI 801 1$bUMI 906 $aBOOK 912 $a9910254561903321 996 $aAchieving and Sustaining Secured Business Operations$92012806 997 $aUNINA