top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Security convergence [[electronic resource] ] : managing enterprise security risk / / Dave Tyson
Security convergence [[electronic resource] ] : managing enterprise security risk / / Dave Tyson
Autore Tyson Dave
Pubbl/distr/stampa Amsterdam ; ; Boston, : Elsevier/Butterworth-Heinemann, c2007
Descrizione fisica 1 online resource (232 p.)
Disciplina 658.4/7
658.47
Soggetto topico Business enterprises - Security measures
Risk management
Computer security
Soggetto genere / forma Electronic books.
ISBN 1-281-03760-5
9786611037604
0-08-054626-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Security Convergence; Copyright Page; Table of Contents; Foreword; Preface; Acknowledgments; Introduction; Section 1: Security To Date; Chapter 1: What is Security Convergence?; Key Concepts of Security Convergence; References; Chapter 2: Why Should You Care?; Rapid Expansion of the Enterprise Ecosystem; Value Migration from Physical to Information-Based and Intangible Assets; New Protective Technologies are Blurring Functional Boundaries; New Compliance And Regulatory Regimes; Continuing Pressure To Reduce Cost; Why Should You Really Care?; References
Chapter 3: Cultural DifferencesSocial Differences; Physical Security Departments; Information Technology Security Departments; Reference; Section 2: The Changing of The Guard; Chapter 4: Changing the Threat Paradigm; Chapter 5: Changing the Security Environment; The Threats have Converged; Security Governance Structures; Chapter 6: Changing the Business Model; Chapter 7: The Ever-Advancing Microchip; Quantum Computing; Reference; Chapter 8: Leveraging Technology; Velocity of Recovery; References; Section 3: The New World; Chapter 9: Disruptive Technology and Other Stuff
Access to Information is EasierMassive Distribution and A Global Footprint; Ability to Automate Attacks; Interconnectivity of Devices; Massive Reliance on Homogeneous Protocols; Very Few End-To-End Security Solutions; Historical Measurements of Business Success are Based on Quarterly Profit and Revenue; The Need to Feed the Beast; Chapter 10: The Need for Education; Chapter 11: Cyber Crime: A Pervasive Threat; Reference; Chapter 12: How These Groups Can Help Each Other; Section 4: Getting From Here To There; Chapter 13: How to Change; Acquire an Executive-Level Sponsor; Draft the New Vision
Have a Solid Change Management PlanAttain Senior Management Buy-In; Strategic Review or Inventory of Assets; Completely Separate Networks; Chapter 14: The Process Approach; Chapter 15: The Organization Size Approach; Small Companies; Medium-Sized Organizations; Large Organizations; Investigations; Chapter 16: The Methodological Approach; Step 1. Project Kick-Off Meeting; Step 2. Data Gathering; Step 3. Information Analysis; Step 4. Solution Design; Step 5. Recommendations; Step 6. Stakeholder Education Sessions; Step 7. Quick Wins; Step 8. Do Not Get Married to the Whole Idea of Convergence
Step 9. TrainingChapter 17: Potential Benefits; Risk Factors; Business Process Factors; Human Factors; Chapter 18: Security Convergence as Strategic Differentiator; Reference; Chapter 19: The Human Resources Perspective; Meeting the Human Resource Challenges of a Converged Organization; The ""Converged Chief Security Officer""; Recruiting and Selecting the Right Chief Security Officer; Building the Converged Security Department; Different Perspectives, Different Questions; Section 5: Sustainability; Chapter 20: Integrated Threat and Event Reporting; Chapter 21: Change Management
Chapter 22: Resistance
Record Nr. UNINA-9910457720903321
Tyson Dave  
Amsterdam ; ; Boston, : Elsevier/Butterworth-Heinemann, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security convergence [[electronic resource] ] : managing enterprise security risk / / Dave Tyson
Security convergence [[electronic resource] ] : managing enterprise security risk / / Dave Tyson
Autore Tyson Dave
Pubbl/distr/stampa Amsterdam ; ; Boston, : Elsevier/Butterworth-Heinemann, c2007
Descrizione fisica 1 online resource (232 p.)
Disciplina 658.4/7
658.47
Soggetto topico Business enterprises - Security measures
Risk management
Computer security
ISBN 1-281-03760-5
9786611037604
0-08-054626-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Security Convergence; Copyright Page; Table of Contents; Foreword; Preface; Acknowledgments; Introduction; Section 1: Security To Date; Chapter 1: What is Security Convergence?; Key Concepts of Security Convergence; References; Chapter 2: Why Should You Care?; Rapid Expansion of the Enterprise Ecosystem; Value Migration from Physical to Information-Based and Intangible Assets; New Protective Technologies are Blurring Functional Boundaries; New Compliance And Regulatory Regimes; Continuing Pressure To Reduce Cost; Why Should You Really Care?; References
Chapter 3: Cultural DifferencesSocial Differences; Physical Security Departments; Information Technology Security Departments; Reference; Section 2: The Changing of The Guard; Chapter 4: Changing the Threat Paradigm; Chapter 5: Changing the Security Environment; The Threats have Converged; Security Governance Structures; Chapter 6: Changing the Business Model; Chapter 7: The Ever-Advancing Microchip; Quantum Computing; Reference; Chapter 8: Leveraging Technology; Velocity of Recovery; References; Section 3: The New World; Chapter 9: Disruptive Technology and Other Stuff
Access to Information is EasierMassive Distribution and A Global Footprint; Ability to Automate Attacks; Interconnectivity of Devices; Massive Reliance on Homogeneous Protocols; Very Few End-To-End Security Solutions; Historical Measurements of Business Success are Based on Quarterly Profit and Revenue; The Need to Feed the Beast; Chapter 10: The Need for Education; Chapter 11: Cyber Crime: A Pervasive Threat; Reference; Chapter 12: How These Groups Can Help Each Other; Section 4: Getting From Here To There; Chapter 13: How to Change; Acquire an Executive-Level Sponsor; Draft the New Vision
Have a Solid Change Management PlanAttain Senior Management Buy-In; Strategic Review or Inventory of Assets; Completely Separate Networks; Chapter 14: The Process Approach; Chapter 15: The Organization Size Approach; Small Companies; Medium-Sized Organizations; Large Organizations; Investigations; Chapter 16: The Methodological Approach; Step 1. Project Kick-Off Meeting; Step 2. Data Gathering; Step 3. Information Analysis; Step 4. Solution Design; Step 5. Recommendations; Step 6. Stakeholder Education Sessions; Step 7. Quick Wins; Step 8. Do Not Get Married to the Whole Idea of Convergence
Step 9. TrainingChapter 17: Potential Benefits; Risk Factors; Business Process Factors; Human Factors; Chapter 18: Security Convergence as Strategic Differentiator; Reference; Chapter 19: The Human Resources Perspective; Meeting the Human Resource Challenges of a Converged Organization; The ""Converged Chief Security Officer""; Recruiting and Selecting the Right Chief Security Officer; Building the Converged Security Department; Different Perspectives, Different Questions; Section 5: Sustainability; Chapter 20: Integrated Threat and Event Reporting; Chapter 21: Change Management
Chapter 22: Resistance
Record Nr. UNINA-9910784351103321
Tyson Dave  
Amsterdam ; ; Boston, : Elsevier/Butterworth-Heinemann, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security convergence : managing enterprise security risk / / Dave Tyson
Security convergence : managing enterprise security risk / / Dave Tyson
Autore Tyson Dave
Edizione [1st ed.]
Pubbl/distr/stampa Amsterdam ; ; Boston, : Elsevier/Butterworth-Heinemann, c2007
Descrizione fisica 1 online resource (232 p.)
Disciplina 658.4/7
658.47
Soggetto topico Business enterprises - Security measures
Risk management
Computer security
ISBN 1-281-03760-5
9786611037604
0-08-054626-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Security Convergence; Copyright Page; Table of Contents; Foreword; Preface; Acknowledgments; Introduction; Section 1: Security To Date; Chapter 1: What is Security Convergence?; Key Concepts of Security Convergence; References; Chapter 2: Why Should You Care?; Rapid Expansion of the Enterprise Ecosystem; Value Migration from Physical to Information-Based and Intangible Assets; New Protective Technologies are Blurring Functional Boundaries; New Compliance And Regulatory Regimes; Continuing Pressure To Reduce Cost; Why Should You Really Care?; References
Chapter 3: Cultural DifferencesSocial Differences; Physical Security Departments; Information Technology Security Departments; Reference; Section 2: The Changing of The Guard; Chapter 4: Changing the Threat Paradigm; Chapter 5: Changing the Security Environment; The Threats have Converged; Security Governance Structures; Chapter 6: Changing the Business Model; Chapter 7: The Ever-Advancing Microchip; Quantum Computing; Reference; Chapter 8: Leveraging Technology; Velocity of Recovery; References; Section 3: The New World; Chapter 9: Disruptive Technology and Other Stuff
Access to Information is EasierMassive Distribution and A Global Footprint; Ability to Automate Attacks; Interconnectivity of Devices; Massive Reliance on Homogeneous Protocols; Very Few End-To-End Security Solutions; Historical Measurements of Business Success are Based on Quarterly Profit and Revenue; The Need to Feed the Beast; Chapter 10: The Need for Education; Chapter 11: Cyber Crime: A Pervasive Threat; Reference; Chapter 12: How These Groups Can Help Each Other; Section 4: Getting From Here To There; Chapter 13: How to Change; Acquire an Executive-Level Sponsor; Draft the New Vision
Have a Solid Change Management PlanAttain Senior Management Buy-In; Strategic Review or Inventory of Assets; Completely Separate Networks; Chapter 14: The Process Approach; Chapter 15: The Organization Size Approach; Small Companies; Medium-Sized Organizations; Large Organizations; Investigations; Chapter 16: The Methodological Approach; Step 1. Project Kick-Off Meeting; Step 2. Data Gathering; Step 3. Information Analysis; Step 4. Solution Design; Step 5. Recommendations; Step 6. Stakeholder Education Sessions; Step 7. Quick Wins; Step 8. Do Not Get Married to the Whole Idea of Convergence
Step 9. TrainingChapter 17: Potential Benefits; Risk Factors; Business Process Factors; Human Factors; Chapter 18: Security Convergence as Strategic Differentiator; Reference; Chapter 19: The Human Resources Perspective; Meeting the Human Resource Challenges of a Converged Organization; The ""Converged Chief Security Officer""; Recruiting and Selecting the Right Chief Security Officer; Building the Converged Security Department; Different Perspectives, Different Questions; Section 5: Sustainability; Chapter 20: Integrated Threat and Event Reporting; Chapter 21: Change Management
Chapter 22: Resistance
Record Nr. UNINA-9910828430303321
Tyson Dave  
Amsterdam ; ; Boston, : Elsevier/Butterworth-Heinemann, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui