Book description
Praise for Tom Patterson's Mapping Security
"Tom Patterson captures a compelling and practical view of security in a multinational environment. Your CSO needs to read this book!"
—Dr. Vint Cerf, senior vice president of Technology Strategy at MCI and founder of Internet Protocol (IP)
"The power of the Internet is that it's a global network, seamlessly crossing borders. But it also brings security risks that can cross borders just as easily. Patterson has more than a decade of first-hand experience in defending against such risks and it shows. He uses real-world examples and stories, many from his own career, and offers clear, action-oriented descriptions of the different threats and how to deal with them. This book avoids security jargon and speaks directly to businesspeople around the globe."
—Chris Anderson, Editor in Chief, Wired Magazine
Whether consumers or global giants, we all need to be spending a greater share of our budgets on security. The threats are greater than ever and increasing daily, and yet there is a challenge as to how to justify the expenditure. Mapping Security offers business-oriented and in-depth thinking on how and why to build security into the fabric of the organization. After reading Tom Patterson's book, you will want to make changes with a sense of urgency.
—John R Patrick, president of Attitude LLC and former vice president ofInternet Technology at IBM Corporation
As companies of all sizes go global in their search for profit and growth, they will need to understand how to use security as a tool for success in different markets, and Mapping Security shows them how.
—Dr. Craig Fields, former director of Advanced Research Projects Agency(ARPA) for the U.S. Government
The Definitive Guide to Effective Security in Complex Global Markets
Companies are global today and have complex security supply chains, out-sourced operations, and customer relationships that span the world. Today, more than ever, companies must protect themselves against unprecedented threats, understand and adhere to a global mosaic of regulations, and leverage security to enable today's business realities. In Mapping Security, global security expert Tom Patterson shows how to meet these challenges by presenting security best practices, rules, and customs for virtually every country where you do business.
Writing for executives, business managers, security professionals, and consultants, Patterson offers an exceptionally thorough and authoritative briefing on today's global security realities. Using real-world examples, he shows how to change your approach to security as you move more deeply into global markets: how to resolve contradictions among the complex rules and customs you'll have to follow and how to customize security solutions for every market. Along the way, he introduces the Mapping Security Index (MSI), a powerful new metric for rapidly quantifying security risk associated with 30 key markets. Coverage includes
How technology, mass globalization, and stricter accountability are forcing security to the core of the enterprise
Six proven keys to defining and implementing global security strategies that work within today's budget realities
Detailed country-by-country drill downs on security in Europe, the Middle East and Africa, the Americas, and the Asia-Pacific region
Practical advice on what to do when laws collide
Quantifying the security posture and associated risks of potential cross-border partners
"On-the-ground" help: Indispensable local security resources
Visit www.MappingSecurity.com for Tom Patterson's latest updates and analysis, including the latest changes to the MSI country scores, and to participate in the Mapping Security Reader Forum.
© Copyright Pearson Education. All rights reserved.
Table of contents
- Copyright
- Praise for Tom Patterson’s Mapping Security
- Acknowledgments
- About the Author
- Foreword
- The Five Ws of Mapping Security
- 1. The Historian and the Security Guy
-
1. Charting a Course
- 2. Why You Picked Up This Book
- 3. Establishing Your Coordinates
- 4. Building the Base
- 5. Enabling Business and Enhancing Process
- 6. Developing Radar
-
7. Constant Vigilance
- Not Anymore, Continued
- Threats
- Known Vulnerabilities and Known Exploits
- Targeted Threats
- Critical Systems and Threats
- Countermeasures
- Regulatory Issues
- Technology
- A Word About the Long Term: IPv6
- The Organizational Security Posture
- What Parts of Constant Vigilance Should I Outsource?
- What to Keep
- Who to Seek
- You Have Just Charted a Course: Let’s Set Sail
-
2. Reality, Illusion, and the Souk
- 8. Wells and the Security Guy Travel the Globe
-
9. Europe
- Europe: Cannon, Queens, and Customs
- On the Ground in Europe
- Corporate Governance, Security, and the EU
- Germany, France, and the United Kingdom
- Germany/Deutschland (.DE)
- France (.FR)
- The United Kingdom (.UK)
- The North
- Ireland (.IE)
- Belgium (.BE)
- Nordic Focus: Denmark, Norway, Sweden (.DK, .NO, .SE)
- The Netherlands/Nederland (.NE)
- Switzerland, Spain, and Italy
- Switzerland/Suisse (.CH)
- Spain/Espania (.ES)
- Italy/Italia (.IT)
- Central and Eastern Europe
- Russia (.RU)
- Czech Republic (.CZ)
- 10. The Middle East and Africa
- 11. The Americas
- 12. Asia Pacific
- 13. Outsourcing and Your Map
- 3. Who’s Law Do I Break?
-
Local Security Resources by Country
- Albania
- Africa
- Argentina
- Australia
- Austria
- Bangladesh
- Belgium
- Bhutan
- Bosnia-Hertzegovina
- Botswana
- Brazil
- Bulgaria
- Canada
- Channel Islands
- Chile
- China
- Croatia
- Cyprus
- Czech Republic
- Denmark
- Egypt
- Estonia
- Ethiopia
- Europe
- Finland
- France
- Germany
- Ghana
- Greece
- Iceland
- India
- Indonesia
- International
- Ireland
- Israel
- Italy
- Japan
- Jordan
- Kenya
- Korea
- Kyrgyzstan
- Luxembourg
- Macedonia
- Malaysia
- Malta
- Mauritius
- Mexico
- Nepal
- Netherlands
- New Zealand
- Norway
- Oman
- Pakistan
- Papua New Guinea
- Poland
- Portugal
- Romania
- Russia
- Saudi Arabia
- Serbia
- Seychelles
- Singapore
- Slovakia
- Slovenia
- Solomon Islands
- South Africa
- South Korea
- Spain
- Sri Lanka
- Sudan
- Sweden
- Switzerland
- Taiwan
- Thailand
- Trinidad
- Turkey
- Uganda
- United Kingdom
- United States of America
- Vietnam
- Zambia
- Zimbabwe
Product information
- Title: Mapping Security: The Corporate Security Sourcebook For Today's Global Economy
- Author(s):
- Release date: December 2004
- Publisher(s): Addison-Wesley Professional
- ISBN: None
You might also like
book
Cybersecurity in the COVID-19 Pandemic
This book demystifies Cybersecurity concepts using real-world cybercrime incidents from the pandemic to illustrate how threat …
book
CMMI® for Services: Guidelines for Superior Service, Second Edition
CMMI® for Services (CMMI-SVC) is a comprehensive set of guidelines to help organizations establish and improve …
book
CIO Wisdom: Best Practices from Silicon Valley's Leading IT Experts
What it takes to be a truly great CIO... from the IT leaders who know best …
book
Defend I.T.: Security by Example
"Ajay and Scott take an interesting approach in filling Defend I.T. with case studies and using …