LEADER 05461nam 2200709 a 450 001 9910828430303321 005 20240515183205.0 010 $a1-281-03760-5 010 $a9786611037604 010 $a0-08-054626-9 035 $a(CKB)1000000000349714 035 $a(EBL)299507 035 $a(OCoLC)173273521 035 $a(SSID)ssj0000077910 035 $a(PQKBManifestationID)11125911 035 $a(PQKBTitleCode)TC0000077910 035 $a(PQKBWorkID)10060358 035 $a(PQKB)10176811 035 $a(PQKBManifestationID)16030829 035 $a(PQKB)24966197 035 $a(MiAaPQ)EBC299507 035 $a(Au-PeEL)EBL299507 035 $a(CaPaEBR)ebr10186765 035 $a(CaONFJC)MIL103760 035 $a(EXLCZ)991000000000349714 100 $a20070906d2007 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aSecurity convergence $emanaging enterprise security risk /$fDave Tyson 205 $a1st ed. 210 $aAmsterdam ;$aBoston $cElsevier/Butterworth-Heinemann$dc2007 215 $a1 online resource (232 p.) 300 $aDescription based upon print version of record. 311 $a0-7506-8425-9 320 $aIncludes bibliographical references and index. 327 $aFront Cover; Security Convergence; Copyright Page; Table of Contents; Foreword; Preface; Acknowledgments; Introduction; Section 1: Security To Date; Chapter 1: What is Security Convergence?; Key Concepts of Security Convergence; References; Chapter 2: Why Should You Care?; Rapid Expansion of the Enterprise Ecosystem; Value Migration from Physical to Information-Based and Intangible Assets; New Protective Technologies are Blurring Functional Boundaries; New Compliance And Regulatory Regimes; Continuing Pressure To Reduce Cost; Why Should You Really Care?; References 327 $aChapter 3: Cultural DifferencesSocial Differences; Physical Security Departments; Information Technology Security Departments; Reference; Section 2: The Changing of The Guard; Chapter 4: Changing the Threat Paradigm; Chapter 5: Changing the Security Environment; The Threats have Converged; Security Governance Structures; Chapter 6: Changing the Business Model; Chapter 7: The Ever-Advancing Microchip; Quantum Computing; Reference; Chapter 8: Leveraging Technology; Velocity of Recovery; References; Section 3: The New World; Chapter 9: Disruptive Technology and Other Stuff 327 $aAccess to Information is EasierMassive Distribution and A Global Footprint; Ability to Automate Attacks; Interconnectivity of Devices; Massive Reliance on Homogeneous Protocols; Very Few End-To-End Security Solutions; Historical Measurements of Business Success are Based on Quarterly Profit and Revenue; The Need to Feed the Beast; Chapter 10: The Need for Education; Chapter 11: Cyber Crime: A Pervasive Threat; Reference; Chapter 12: How These Groups Can Help Each Other; Section 4: Getting From Here To There; Chapter 13: How to Change; Acquire an Executive-Level Sponsor; Draft the New Vision 327 $aHave a Solid Change Management PlanAttain Senior Management Buy-In; Strategic Review or Inventory of Assets; Completely Separate Networks; Chapter 14: The Process Approach; Chapter 15: The Organization Size Approach; Small Companies; Medium-Sized Organizations; Large Organizations; Investigations; Chapter 16: The Methodological Approach; Step 1. Project Kick-Off Meeting; Step 2. Data Gathering; Step 3. Information Analysis; Step 4. Solution Design; Step 5. Recommendations; Step 6. Stakeholder Education Sessions; Step 7. Quick Wins; Step 8. Do Not Get Married to the Whole Idea of Convergence 327 $aStep 9. TrainingChapter 17: Potential Benefits; Risk Factors; Business Process Factors; Human Factors; Chapter 18: Security Convergence as Strategic Differentiator; Reference; Chapter 19: The Human Resources Perspective; Meeting the Human Resource Challenges of a Converged Organization; The ""Converged Chief Security Officer""; Recruiting and Selecting the Right Chief Security Officer; Building the Converged Security Department; Different Perspectives, Different Questions; Section 5: Sustainability; Chapter 20: Integrated Threat and Event Reporting; Chapter 21: Change Management 327 $aChapter 22: Resistance 330 $aSecurity Convergence describes the movement in business to combine the roles of physical security and security management with network computer security measures within an organization. This is the first book to discuss the subject of security convergence, providing real-world illustrations of implementation and the cost-saving benefits that result. Security Convergence discusses security management, electronic security solutions, and network security and the manner in which all of these interact. Combining security procedures and arriving at complete security soluti 606 $aBusiness enterprises$xSecurity measures 606 $aRisk management 606 $aComputer security 615 0$aBusiness enterprises$xSecurity measures. 615 0$aRisk management. 615 0$aComputer security. 676 $a658.4/7 676 $a658.47 676 $a658.47 700 $aTyson$b Dave$01705505 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910828430303321 996 $aSecurity convergence$94092225 997 $aUNINA