Security convergence [[electronic resource] ] : managing enterprise security risk / / Dave Tyson |
Autore | Tyson Dave |
Pubbl/distr/stampa | Amsterdam ; ; Boston, : Elsevier/Butterworth-Heinemann, c2007 |
Descrizione fisica | 1 online resource (232 p.) |
Disciplina |
658.4/7
658.47 |
Soggetto topico |
Business enterprises - Security measures
Risk management Computer security |
Soggetto genere / forma | Electronic books. |
ISBN |
1-281-03760-5
9786611037604 0-08-054626-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Security Convergence; Copyright Page; Table of Contents; Foreword; Preface; Acknowledgments; Introduction; Section 1: Security To Date; Chapter 1: What is Security Convergence?; Key Concepts of Security Convergence; References; Chapter 2: Why Should You Care?; Rapid Expansion of the Enterprise Ecosystem; Value Migration from Physical to Information-Based and Intangible Assets; New Protective Technologies are Blurring Functional Boundaries; New Compliance And Regulatory Regimes; Continuing Pressure To Reduce Cost; Why Should You Really Care?; References
Chapter 3: Cultural DifferencesSocial Differences; Physical Security Departments; Information Technology Security Departments; Reference; Section 2: The Changing of The Guard; Chapter 4: Changing the Threat Paradigm; Chapter 5: Changing the Security Environment; The Threats have Converged; Security Governance Structures; Chapter 6: Changing the Business Model; Chapter 7: The Ever-Advancing Microchip; Quantum Computing; Reference; Chapter 8: Leveraging Technology; Velocity of Recovery; References; Section 3: The New World; Chapter 9: Disruptive Technology and Other Stuff Access to Information is EasierMassive Distribution and A Global Footprint; Ability to Automate Attacks; Interconnectivity of Devices; Massive Reliance on Homogeneous Protocols; Very Few End-To-End Security Solutions; Historical Measurements of Business Success are Based on Quarterly Profit and Revenue; The Need to Feed the Beast; Chapter 10: The Need for Education; Chapter 11: Cyber Crime: A Pervasive Threat; Reference; Chapter 12: How These Groups Can Help Each Other; Section 4: Getting From Here To There; Chapter 13: How to Change; Acquire an Executive-Level Sponsor; Draft the New Vision Have a Solid Change Management PlanAttain Senior Management Buy-In; Strategic Review or Inventory of Assets; Completely Separate Networks; Chapter 14: The Process Approach; Chapter 15: The Organization Size Approach; Small Companies; Medium-Sized Organizations; Large Organizations; Investigations; Chapter 16: The Methodological Approach; Step 1. Project Kick-Off Meeting; Step 2. Data Gathering; Step 3. Information Analysis; Step 4. Solution Design; Step 5. Recommendations; Step 6. Stakeholder Education Sessions; Step 7. Quick Wins; Step 8. Do Not Get Married to the Whole Idea of Convergence Step 9. TrainingChapter 17: Potential Benefits; Risk Factors; Business Process Factors; Human Factors; Chapter 18: Security Convergence as Strategic Differentiator; Reference; Chapter 19: The Human Resources Perspective; Meeting the Human Resource Challenges of a Converged Organization; The ""Converged Chief Security Officer""; Recruiting and Selecting the Right Chief Security Officer; Building the Converged Security Department; Different Perspectives, Different Questions; Section 5: Sustainability; Chapter 20: Integrated Threat and Event Reporting; Chapter 21: Change Management Chapter 22: Resistance |
Record Nr. | UNINA-9910457720903321 |
Tyson Dave | ||
Amsterdam ; ; Boston, : Elsevier/Butterworth-Heinemann, c2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security convergence [[electronic resource] ] : managing enterprise security risk / / Dave Tyson |
Autore | Tyson Dave |
Pubbl/distr/stampa | Amsterdam ; ; Boston, : Elsevier/Butterworth-Heinemann, c2007 |
Descrizione fisica | 1 online resource (232 p.) |
Disciplina |
658.4/7
658.47 |
Soggetto topico |
Business enterprises - Security measures
Risk management Computer security |
ISBN |
1-281-03760-5
9786611037604 0-08-054626-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Security Convergence; Copyright Page; Table of Contents; Foreword; Preface; Acknowledgments; Introduction; Section 1: Security To Date; Chapter 1: What is Security Convergence?; Key Concepts of Security Convergence; References; Chapter 2: Why Should You Care?; Rapid Expansion of the Enterprise Ecosystem; Value Migration from Physical to Information-Based and Intangible Assets; New Protective Technologies are Blurring Functional Boundaries; New Compliance And Regulatory Regimes; Continuing Pressure To Reduce Cost; Why Should You Really Care?; References
Chapter 3: Cultural DifferencesSocial Differences; Physical Security Departments; Information Technology Security Departments; Reference; Section 2: The Changing of The Guard; Chapter 4: Changing the Threat Paradigm; Chapter 5: Changing the Security Environment; The Threats have Converged; Security Governance Structures; Chapter 6: Changing the Business Model; Chapter 7: The Ever-Advancing Microchip; Quantum Computing; Reference; Chapter 8: Leveraging Technology; Velocity of Recovery; References; Section 3: The New World; Chapter 9: Disruptive Technology and Other Stuff Access to Information is EasierMassive Distribution and A Global Footprint; Ability to Automate Attacks; Interconnectivity of Devices; Massive Reliance on Homogeneous Protocols; Very Few End-To-End Security Solutions; Historical Measurements of Business Success are Based on Quarterly Profit and Revenue; The Need to Feed the Beast; Chapter 10: The Need for Education; Chapter 11: Cyber Crime: A Pervasive Threat; Reference; Chapter 12: How These Groups Can Help Each Other; Section 4: Getting From Here To There; Chapter 13: How to Change; Acquire an Executive-Level Sponsor; Draft the New Vision Have a Solid Change Management PlanAttain Senior Management Buy-In; Strategic Review or Inventory of Assets; Completely Separate Networks; Chapter 14: The Process Approach; Chapter 15: The Organization Size Approach; Small Companies; Medium-Sized Organizations; Large Organizations; Investigations; Chapter 16: The Methodological Approach; Step 1. Project Kick-Off Meeting; Step 2. Data Gathering; Step 3. Information Analysis; Step 4. Solution Design; Step 5. Recommendations; Step 6. Stakeholder Education Sessions; Step 7. Quick Wins; Step 8. Do Not Get Married to the Whole Idea of Convergence Step 9. TrainingChapter 17: Potential Benefits; Risk Factors; Business Process Factors; Human Factors; Chapter 18: Security Convergence as Strategic Differentiator; Reference; Chapter 19: The Human Resources Perspective; Meeting the Human Resource Challenges of a Converged Organization; The ""Converged Chief Security Officer""; Recruiting and Selecting the Right Chief Security Officer; Building the Converged Security Department; Different Perspectives, Different Questions; Section 5: Sustainability; Chapter 20: Integrated Threat and Event Reporting; Chapter 21: Change Management Chapter 22: Resistance |
Record Nr. | UNINA-9910784351103321 |
Tyson Dave | ||
Amsterdam ; ; Boston, : Elsevier/Butterworth-Heinemann, c2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security convergence : managing enterprise security risk / / Dave Tyson |
Autore | Tyson Dave |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Amsterdam ; ; Boston, : Elsevier/Butterworth-Heinemann, c2007 |
Descrizione fisica | 1 online resource (232 p.) |
Disciplina |
658.4/7
658.47 |
Soggetto topico |
Business enterprises - Security measures
Risk management Computer security |
ISBN |
1-281-03760-5
9786611037604 0-08-054626-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Security Convergence; Copyright Page; Table of Contents; Foreword; Preface; Acknowledgments; Introduction; Section 1: Security To Date; Chapter 1: What is Security Convergence?; Key Concepts of Security Convergence; References; Chapter 2: Why Should You Care?; Rapid Expansion of the Enterprise Ecosystem; Value Migration from Physical to Information-Based and Intangible Assets; New Protective Technologies are Blurring Functional Boundaries; New Compliance And Regulatory Regimes; Continuing Pressure To Reduce Cost; Why Should You Really Care?; References
Chapter 3: Cultural DifferencesSocial Differences; Physical Security Departments; Information Technology Security Departments; Reference; Section 2: The Changing of The Guard; Chapter 4: Changing the Threat Paradigm; Chapter 5: Changing the Security Environment; The Threats have Converged; Security Governance Structures; Chapter 6: Changing the Business Model; Chapter 7: The Ever-Advancing Microchip; Quantum Computing; Reference; Chapter 8: Leveraging Technology; Velocity of Recovery; References; Section 3: The New World; Chapter 9: Disruptive Technology and Other Stuff Access to Information is EasierMassive Distribution and A Global Footprint; Ability to Automate Attacks; Interconnectivity of Devices; Massive Reliance on Homogeneous Protocols; Very Few End-To-End Security Solutions; Historical Measurements of Business Success are Based on Quarterly Profit and Revenue; The Need to Feed the Beast; Chapter 10: The Need for Education; Chapter 11: Cyber Crime: A Pervasive Threat; Reference; Chapter 12: How These Groups Can Help Each Other; Section 4: Getting From Here To There; Chapter 13: How to Change; Acquire an Executive-Level Sponsor; Draft the New Vision Have a Solid Change Management PlanAttain Senior Management Buy-In; Strategic Review or Inventory of Assets; Completely Separate Networks; Chapter 14: The Process Approach; Chapter 15: The Organization Size Approach; Small Companies; Medium-Sized Organizations; Large Organizations; Investigations; Chapter 16: The Methodological Approach; Step 1. Project Kick-Off Meeting; Step 2. Data Gathering; Step 3. Information Analysis; Step 4. Solution Design; Step 5. Recommendations; Step 6. Stakeholder Education Sessions; Step 7. Quick Wins; Step 8. Do Not Get Married to the Whole Idea of Convergence Step 9. TrainingChapter 17: Potential Benefits; Risk Factors; Business Process Factors; Human Factors; Chapter 18: Security Convergence as Strategic Differentiator; Reference; Chapter 19: The Human Resources Perspective; Meeting the Human Resource Challenges of a Converged Organization; The ""Converged Chief Security Officer""; Recruiting and Selecting the Right Chief Security Officer; Building the Converged Security Department; Different Perspectives, Different Questions; Section 5: Sustainability; Chapter 20: Integrated Threat and Event Reporting; Chapter 21: Change Management Chapter 22: Resistance |
Record Nr. | UNINA-9910828430303321 |
Tyson Dave | ||
Amsterdam ; ; Boston, : Elsevier/Butterworth-Heinemann, c2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|