Skip to Content
Security De-Engineering
book

Security De-Engineering

by Ian Tibble
December 2011
Intermediate to advanced content levelIntermediate to advanced
332 pages
9h 15m
English
Auerbach Publications
Content preview from Security De-Engineering
One PrOfeSSiOnal accreDitatiOn PrOgram 281
the name suggests, are supposed to analyze things, not parrot- fashion
deliver security services with checklists and “best practices.”
How about the “audit-driven security strategy” as I covered in
Chapter 4? Again, with the population of suitable skills in analysis and
management, organizations will move away from this approach slowly
over a few years. ere will still be audit and regulatory compliance
requirements for a long time to come, but it will no longer be the case
that the security strategy is geared up to just about creep over the line
in barely passing the audit. However, once regulators realize how bad
their audit quality has been all these years, the audits may well start
getting ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advanced Persistent Threat

Advanced Persistent Threat

Eric Cole
Point & Click OpenOffice.org!

Point & Click OpenOffice.org!

Robin ‘Roblimo’ Miller

Publisher Resources

ISBN: 9781439868355