skip to content
Security strategy : from requirements to reality Preview this item
ClosePreview this item
Checking...

Security strategy : from requirements to reality

Author: Bill Stackpole; Eric Oksendahl
Publisher: Boca Raton, FL : CRC Press, ©2011.
Edition/Format:   Print book : EnglishView all editions and formats
Summary:
Addressing the diminished understanding of the value of security on the executive side and a lack of good business processes on the security side, Security Strategy: From Requirements to Reality explains how to select, develop, and deploy the security strategy best suited to your organization. It clarifies the purpose and place of strategy in an information security program and arms security managers and
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Document Type: Book
All Authors / Contributors: Bill Stackpole; Eric Oksendahl
ISBN: 9781439827338 1439827338
OCLC Number: 435419200
Description: xxiii, 321 pages : illustrations ; 26 cm
Contents: Strategy : an introduction --
Getting the big picture --
Testing the consumer --
Strategic framework (imputs to strategic planning) --
Developing a strategic planning process --
Gates, geeks, and guards (security convergence) --
Tactics : an introduction --
Layer upon layer (defense in depth) --
Did you see that! (observation) --
Trust but verify (accountability) --
SDL and incident response --
Keep your enemies closer --
Hire a Hessian (outsourcing) --
Security awareness training.
Responsibility: Bill Stackpole and Eric Oksendahl.

Abstract:

Addressing the diminished understanding of the value of security on the executive side and a lack of good business processes on the security side, Security Strategy: From Requirements to Reality explains how to select, develop, and deploy the security strategy best suited to your organization. It clarifies the purpose and place of strategy in an information security program and arms security managers and practitioners with a set of security tactics to support the implementation of strategic planning initiatives, goals, and objectives.

The book focuses on security strategy planning and execution to provide a clear and comprehensive look at the structures and tools needed to build a security program that enables and enhances business processes. Divided into two parts, the first part considers business strategy and the second part details specific tactics. The information in both sections will help security practitioners and managers develop a viable synergy that will allow security to take its place as a valued partner and contributor to the success and profitability of the enterprise.

Confusing strategies and tactics all too often keep organizations from properly implementing an effective information protection strategy. This versatile reference presents information in a way that makes it accessible and applicable to organizations of all sizes. Complete with checklists of the physical security requirements that organizations should consider when evaluating or designing facilities, it provides the tools and understanding to enable your company to achieve the operational efficiencies, cost reductions, and brand enhancements that are possible when an effective security strategy is put into action.

Reviews

Editorial reviews

Publisher Synopsis

This book focuses on the process, objectives, and controls of security strategy. It consists of two sections: Strategy (6 chapters) and Tactics (8 chapters). The sections include strategy how-to's Read more...

 
User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/435419200> # Security strategy : from requirements to reality
    a schema:Book, schema:CreativeWork ;
   library:oclcnum "435419200" ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/798264774#Place/boca_raton_fl> ; # Boca Raton, FL
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/flu> ;
   schema:about <http://id.worldcat.org/fast/887958> ; # Data protection
   schema:about <http://id.worldcat.org/fast/842307> ; # Business--Data processing--Security measures
   schema:about <http://dewey.info/class/005.8/e22/> ;
   schema:about <http://id.loc.gov/authorities/subjects/sh2009117958> ; # Business--Data processing--Security measures
   schema:about <http://id.worldcat.org/fast/973129> ; # Information technology--Security measures
   schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
   schema:about <http://id.loc.gov/authorities/subjects/sh2009127217> ; # Information technology--Security measures
   schema:bookFormat bgn:PrintBook ;
   schema:contributor <http://viaf.org/viaf/158512417> ; # Eric Oksendahl
   schema:copyrightYear "2011" ;
   schema:creator <http://viaf.org/viaf/4382795> ; # Bill Stackpole
   schema:datePublished "2011" ;
   schema:description "Strategy : an introduction -- Getting the big picture -- Testing the consumer -- Strategic framework (imputs to strategic planning) -- Developing a strategic planning process -- Gates, geeks, and guards (security convergence) -- Tactics : an introduction -- Layer upon layer (defense in depth) -- Did you see that! (observation) -- Trust but verify (accountability) -- SDL and incident response -- Keep your enemies closer -- Hire a Hessian (outsourcing) -- Security awareness training."@en ;
   schema:description "The book focuses on security strategy planning and execution to provide a clear and comprehensive look at the structures and tools needed to build a security program that enables and enhances business processes. Divided into two parts, the first part considers business strategy and the second part details specific tactics. The information in both sections will help security practitioners and managers develop a viable synergy that will allow security to take its place as a valued partner and contributor to the success and profitability of the enterprise."@en ;
   schema:description "Confusing strategies and tactics all too often keep organizations from properly implementing an effective information protection strategy. This versatile reference presents information in a way that makes it accessible and applicable to organizations of all sizes. Complete with checklists of the physical security requirements that organizations should consider when evaluating or designing facilities, it provides the tools and understanding to enable your company to achieve the operational efficiencies, cost reductions, and brand enhancements that are possible when an effective security strategy is put into action."@en ;
   schema:description "Addressing the diminished understanding of the value of security on the executive side and a lack of good business processes on the security side, Security Strategy: From Requirements to Reality explains how to select, develop, and deploy the security strategy best suited to your organization. It clarifies the purpose and place of strategy in an information security program and arms security managers and practitioners with a set of security tactics to support the implementation of strategic planning initiatives, goals, and objectives."@en ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/798264774> ;
   schema:inLanguage "en" ;
   schema:name "Security strategy : from requirements to reality"@en ;
   schema:productID "435419200" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/435419200#PublicationEvent/boca_raton_fl_crc_press_2011> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/798264774#Agent/crc_press> ; # CRC Press
   schema:workExample <http://worldcat.org/isbn/9781439827338> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/435419200> ;
    .


Related Entities

<http://id.loc.gov/authorities/subjects/sh2009117958> # Business--Data processing--Security measures
    a schema:Intangible ;
   schema:name "Business--Data processing--Security measures"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh2009127217> # Information technology--Security measures
    a schema:Intangible ;
   schema:name "Information technology--Security measures"@en ;
    .

<http://id.worldcat.org/fast/842307> # Business--Data processing--Security measures
    a schema:Intangible ;
   schema:name "Business--Data processing--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
   schema:name "Computer security"@en ;
    .

<http://id.worldcat.org/fast/887958> # Data protection
    a schema:Intangible ;
   schema:name "Data protection"@en ;
    .

<http://id.worldcat.org/fast/973129> # Information technology--Security measures
    a schema:Intangible ;
   schema:name "Information technology--Security measures"@en ;
    .

<http://viaf.org/viaf/158512417> # Eric Oksendahl
    a schema:Person ;
   schema:familyName "Oksendahl" ;
   schema:givenName "Eric" ;
   schema:name "Eric Oksendahl" ;
    .

<http://viaf.org/viaf/4382795> # Bill Stackpole
    a schema:Person ;
   schema:familyName "Stackpole" ;
   schema:givenName "Bill" ;
   schema:name "Bill Stackpole" ;
    .

<http://worldcat.org/isbn/9781439827338>
    a schema:ProductModel ;
   schema:isbn "1439827338" ;
   schema:isbn "9781439827338" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.