Security Strategy

Book description

Clarifying the purpose and place of strategy in an information security program, this book explains how to select, develop, and deploy the security strategy best suited to an organization. It focuses on security strategy planning and execution to provide a comprehensive look at the structures and tools needed to build a security program that enables and enhances business processes. Divided into two parts, the first part considers business strategy and the second part details specific tactics that support the implementation of strategic planning initiatives, goals, and objectives.

Table of contents

  1. Front cover
  2. Dedication
  3. Contents (1/2)
  4. Contents (2/2)
  5. Acknowledgments
  6. Introduction
  7. Preface
  8. Authors
  9. Section I. STRATEGY
  10. Chapter 1. Strategy: An Introduction (1/3)
  11. Chapter 1. Strategy: An Introduction (2/3)
  12. Chapter 1. Strategy: An Introduction (3/3)
  13. Chapter 2. Getting to the Big Picture (1/5)
  14. Chapter 2. Getting to the Big Picture (2/5)
  15. Chapter 2. Getting to the Big Picture (3/5)
  16. Chapter 2. Getting to the Big Picture (4/5)
  17. Chapter 2. Getting to the Big Picture (5/5)
  18. Chapter 3. Testing the Consumer (1/3)
  19. Chapter 3. Testing the Consumer (2/3)
  20. Chapter 3. Testing the Consumer (3/3)
  21. Chapter 4. Strategic Framework (Inputs to Strategic Planning) (1/4)
  22. Chapter 4. Strategic Framework (Inputs to Strategic Planning) (2/4)
  23. Chapter 4. Strategic Framework (Inputs to Strategic Planning) (3/4)
  24. Chapter 4. Strategic Framework (Inputs to Strategic Planning) (4/4)
  25. Chapter 5. Developing a Strategic Planning Process (1/4)
  26. Chapter 5. Developing a Strategic Planning Process (2/4)
  27. Chapter 5. Developing a Strategic Planning Process (3/4)
  28. Chapter 5. Developing a Strategic Planning Process (4/4)
  29. Chapter 6. Gates, Geeks, and Guards (Security Convergence) (1/2)
  30. Chapter 6. Gates, Geeks, and Guards (Security Convergence) (2/2)
  31. Section II. TACTICS
  32. Chapter 7. Tactics: An Introduction (1/4)
  33. Chapter 7. Tactics: An Introduction (2/4)
  34. Chapter 7. Tactics: An Introduction (3/4)
  35. Chapter 7. Tactics: An Introduction (4/4)
  36. Chapter 8. Layer upon Layer (Defense in Depth) (1/5)
  37. Chapter 8. Layer upon Layer (Defense in Depth) (2/5)
  38. Chapter 8. Layer upon Layer (Defense in Depth) (3/5)
  39. Chapter 8. Layer upon Layer (Defense in Depth) (4/5)
  40. Chapter 8. Layer upon Layer (Defense in Depth) (5/5)
  41. Chapter 9. Did You See That! (Observation) (1/6)
  42. Chapter 9. Did You See That! (Observation) (2/6)
  43. Chapter 9. Did You See That! (Observation) (3/6)
  44. Chapter 9. Did You See That! (Observation) (4/6)
  45. Chapter 9. Did You See That! (Observation) (5/6)
  46. Chapter 9. Did You See That! (Observation) (6/6)
  47. Chapter 10. Trust but Verify (Accountability) (1/4)
  48. Chapter 10. Trust but Verify (Accountability) (2/4)
  49. Chapter 10. Trust but Verify (Accountability) (3/4)
  50. Chapter 10. Trust but Verify (Accountability) (4/4)
  51. Chapter 11. SDL and Incident Response (1/8)
  52. Chapter 11. SDL and Incident Response (2/8)
  53. Chapter 11. SDL and Incident Response (3/8)
  54. Chapter 11. SDL and Incident Response (4/8)
  55. Chapter 11. SDL and Incident Response (5/8)
  56. Chapter 11. SDL and Incident Response (6/8)
  57. Chapter 11. SDL and Incident Response (7/8)
  58. Chapter 11. SDL and Incident Response (8/8)
  59. Chapter 12. Keep Your Enemies Closer (1/6)
  60. Chapter 12. Keep Your Enemies Closer (2/6)
  61. Chapter 12. Keep Your Enemies Closer (3/6)
  62. Chapter 12. Keep Your Enemies Closer (4/6)
  63. Chapter 12. Keep Your Enemies Closer (5/6)
  64. Chapter 12. Keep Your Enemies Closer (6/6)
  65. Chapter 13. Hire a Hessian (Outsourcing) (1/5)
  66. Chapter 13. Hire a Hessian (Outsourcing) (2/5)
  67. Chapter 13. Hire a Hessian (Outsourcing) (3/5)
  68. Chapter 13. Hire a Hessian (Outsourcing) (4/5)
  69. Chapter 13. Hire a Hessian (Outsourcing) (5/5)
  70. Chapter 14. Security Awareness Training (1/4)
  71. Chapter 14. Security Awareness Training (2/4)
  72. Chapter 14. Security Awareness Training (3/4)
  73. Chapter 14. Security Awareness Training (4/4)
  74. References (1/2)
  75. References (2/2)
  76. Appendix (1/2)
  77. Appendix (2/2)
  78. Index (1/2)
  79. Index (2/2)
  80. Back cover

Product information

  • Title: Security Strategy
  • Author(s): Bill Stackpole, Eric Oksendahl
  • Release date: October 2010
  • Publisher(s): Auerbach Publications
  • ISBN: 9781439827345