Vai al contenuto principale della pagina

Security convergence : managing enterprise security risk / / Dave Tyson



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Autore: Tyson Dave Visualizza persona
Titolo: Security convergence : managing enterprise security risk / / Dave Tyson Visualizza cluster
Pubblicazione: Amsterdam ; ; Boston, : Elsevier/Butterworth-Heinemann, c2007
Edizione: 1st ed.
Descrizione fisica: 1 online resource (232 p.)
Disciplina: 658.4/7
658.47
Soggetto topico: Business enterprises - Security measures
Risk management
Computer security
Note generali: Description based upon print version of record.
Nota di bibliografia: Includes bibliographical references and index.
Nota di contenuto: Front Cover; Security Convergence; Copyright Page; Table of Contents; Foreword; Preface; Acknowledgments; Introduction; Section 1: Security To Date; Chapter 1: What is Security Convergence?; Key Concepts of Security Convergence; References; Chapter 2: Why Should You Care?; Rapid Expansion of the Enterprise Ecosystem; Value Migration from Physical to Information-Based and Intangible Assets; New Protective Technologies are Blurring Functional Boundaries; New Compliance And Regulatory Regimes; Continuing Pressure To Reduce Cost; Why Should You Really Care?; References
Chapter 3: Cultural DifferencesSocial Differences; Physical Security Departments; Information Technology Security Departments; Reference; Section 2: The Changing of The Guard; Chapter 4: Changing the Threat Paradigm; Chapter 5: Changing the Security Environment; The Threats have Converged; Security Governance Structures; Chapter 6: Changing the Business Model; Chapter 7: The Ever-Advancing Microchip; Quantum Computing; Reference; Chapter 8: Leveraging Technology; Velocity of Recovery; References; Section 3: The New World; Chapter 9: Disruptive Technology and Other Stuff
Access to Information is EasierMassive Distribution and A Global Footprint; Ability to Automate Attacks; Interconnectivity of Devices; Massive Reliance on Homogeneous Protocols; Very Few End-To-End Security Solutions; Historical Measurements of Business Success are Based on Quarterly Profit and Revenue; The Need to Feed the Beast; Chapter 10: The Need for Education; Chapter 11: Cyber Crime: A Pervasive Threat; Reference; Chapter 12: How These Groups Can Help Each Other; Section 4: Getting From Here To There; Chapter 13: How to Change; Acquire an Executive-Level Sponsor; Draft the New Vision
Have a Solid Change Management PlanAttain Senior Management Buy-In; Strategic Review or Inventory of Assets; Completely Separate Networks; Chapter 14: The Process Approach; Chapter 15: The Organization Size Approach; Small Companies; Medium-Sized Organizations; Large Organizations; Investigations; Chapter 16: The Methodological Approach; Step 1. Project Kick-Off Meeting; Step 2. Data Gathering; Step 3. Information Analysis; Step 4. Solution Design; Step 5. Recommendations; Step 6. Stakeholder Education Sessions; Step 7. Quick Wins; Step 8. Do Not Get Married to the Whole Idea of Convergence
Step 9. TrainingChapter 17: Potential Benefits; Risk Factors; Business Process Factors; Human Factors; Chapter 18: Security Convergence as Strategic Differentiator; Reference; Chapter 19: The Human Resources Perspective; Meeting the Human Resource Challenges of a Converged Organization; The ""Converged Chief Security Officer""; Recruiting and Selecting the Right Chief Security Officer; Building the Converged Security Department; Different Perspectives, Different Questions; Section 5: Sustainability; Chapter 20: Integrated Threat and Event Reporting; Chapter 21: Change Management
Chapter 22: Resistance
Sommario/riassunto: Security Convergence describes the movement in business to combine the roles of physical security and security management with network computer security measures within an organization. This is the first book to discuss the subject of security convergence, providing real-world illustrations of implementation and the cost-saving benefits that result. Security Convergence discusses security management, electronic security solutions, and network security and the manner in which all of these interact. Combining security procedures and arriving at complete security soluti
Titolo autorizzato: Security convergence  Visualizza cluster
ISBN: 1-281-03760-5
9786611037604
0-08-054626-9
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910828430303321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui