Skip to Content
Security De-Engineering
book

Security De-Engineering

by Ian Tibble
December 2011
Intermediate to advanced content levelIntermediate to advanced
332 pages
9h 15m
English
Auerbach Publications
Content preview from Security De-Engineering
8 Security De-engineering
and monitored policy compliance). Certainly there was no market for
Big Four outside the banking sector and telecommunications. is
was not because we were too expensive (which we were)—there was
actually no market for any security service provider, as in no demand
whatsoever for any corporate information security services.
Another driving force for security spending is the good old “what
are my competitors doing?” factor. Going back to the early 2000s,
on professional service engagements, TSAP clients would demand to
know how their security posture stacked up against rms in the same
industry sector, and they asked for the statistics to be included in the
report.
ere was one project I remember clearly because of the ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advanced Persistent Threat

Advanced Persistent Threat

Eric Cole
Point & Click OpenOffice.org!

Point & Click OpenOffice.org!

Robin ‘Roblimo’ Miller

Publisher Resources

ISBN: 9781439868355