Book description
Clarifying the purpose and place of strategy in an information security program, this book explains how to select, develop, and deploy the security strategy best suited to an organization. It focuses on security strategy planning and execution to provide a comprehensive look at the structures and tools needed to build a security program that enables and enhances business processes. Divided into two parts, the first part considers business strategy and the second part details specific tactics that support the implementation of strategic planning initiatives, goals, and objectives.
Table of contents
- Front cover
- Dedication
- Contents (1/2)
- Contents (2/2)
- Acknowledgments
- Introduction
- Preface
- Authors
- Section I. STRATEGY
- Chapter 1. Strategy: An Introduction (1/3)
- Chapter 1. Strategy: An Introduction (2/3)
- Chapter 1. Strategy: An Introduction (3/3)
- Chapter 2. Getting to the Big Picture (1/5)
- Chapter 2. Getting to the Big Picture (2/5)
- Chapter 2. Getting to the Big Picture (3/5)
- Chapter 2. Getting to the Big Picture (4/5)
- Chapter 2. Getting to the Big Picture (5/5)
- Chapter 3. Testing the Consumer (1/3)
- Chapter 3. Testing the Consumer (2/3)
- Chapter 3. Testing the Consumer (3/3)
- Chapter 4. Strategic Framework (Inputs to Strategic Planning) (1/4)
- Chapter 4. Strategic Framework (Inputs to Strategic Planning) (2/4)
- Chapter 4. Strategic Framework (Inputs to Strategic Planning) (3/4)
- Chapter 4. Strategic Framework (Inputs to Strategic Planning) (4/4)
- Chapter 5. Developing a Strategic Planning Process (1/4)
- Chapter 5. Developing a Strategic Planning Process (2/4)
- Chapter 5. Developing a Strategic Planning Process (3/4)
- Chapter 5. Developing a Strategic Planning Process (4/4)
- Chapter 6. Gates, Geeks, and Guards (Security Convergence) (1/2)
- Chapter 6. Gates, Geeks, and Guards (Security Convergence) (2/2)
- Section II. TACTICS
- Chapter 7. Tactics: An Introduction (1/4)
- Chapter 7. Tactics: An Introduction (2/4)
- Chapter 7. Tactics: An Introduction (3/4)
- Chapter 7. Tactics: An Introduction (4/4)
- Chapter 8. Layer upon Layer (Defense in Depth) (1/5)
- Chapter 8. Layer upon Layer (Defense in Depth) (2/5)
- Chapter 8. Layer upon Layer (Defense in Depth) (3/5)
- Chapter 8. Layer upon Layer (Defense in Depth) (4/5)
- Chapter 8. Layer upon Layer (Defense in Depth) (5/5)
- Chapter 9. Did You See That! (Observation) (1/6)
- Chapter 9. Did You See That! (Observation) (2/6)
- Chapter 9. Did You See That! (Observation) (3/6)
- Chapter 9. Did You See That! (Observation) (4/6)
- Chapter 9. Did You See That! (Observation) (5/6)
- Chapter 9. Did You See That! (Observation) (6/6)
- Chapter 10. Trust but Verify (Accountability) (1/4)
- Chapter 10. Trust but Verify (Accountability) (2/4)
- Chapter 10. Trust but Verify (Accountability) (3/4)
- Chapter 10. Trust but Verify (Accountability) (4/4)
- Chapter 11. SDL and Incident Response (1/8)
- Chapter 11. SDL and Incident Response (2/8)
- Chapter 11. SDL and Incident Response (3/8)
- Chapter 11. SDL and Incident Response (4/8)
- Chapter 11. SDL and Incident Response (5/8)
- Chapter 11. SDL and Incident Response (6/8)
- Chapter 11. SDL and Incident Response (7/8)
- Chapter 11. SDL and Incident Response (8/8)
- Chapter 12. Keep Your Enemies Closer (1/6)
- Chapter 12. Keep Your Enemies Closer (2/6)
- Chapter 12. Keep Your Enemies Closer (3/6)
- Chapter 12. Keep Your Enemies Closer (4/6)
- Chapter 12. Keep Your Enemies Closer (5/6)
- Chapter 12. Keep Your Enemies Closer (6/6)
- Chapter 13. Hire a Hessian (Outsourcing) (1/5)
- Chapter 13. Hire a Hessian (Outsourcing) (2/5)
- Chapter 13. Hire a Hessian (Outsourcing) (3/5)
- Chapter 13. Hire a Hessian (Outsourcing) (4/5)
- Chapter 13. Hire a Hessian (Outsourcing) (5/5)
- Chapter 14. Security Awareness Training (1/4)
- Chapter 14. Security Awareness Training (2/4)
- Chapter 14. Security Awareness Training (3/4)
- Chapter 14. Security Awareness Training (4/4)
- References (1/2)
- References (2/2)
- Appendix (1/2)
- Appendix (2/2)
- Index (1/2)
- Index (2/2)
- Back cover
Product information
- Title: Security Strategy
- Author(s):
- Release date: October 2010
- Publisher(s): Auerbach Publications
- ISBN: 9781439827345
You might also like
book
Information Security Management, 2nd Edition
Information Security Management, Second Edition arms students with answers to the most critical questions about the …
book
Security for Business Professionals
Security for Business Professionals offers business executives and managers everything they need to set-up a security …
book
Rational Cybersecurity for Business: The Security Leaders' Guide to Business Alignment
Use the guidance in this comprehensive field guide to gain the support of your top executives …
book
Assessing Information Security: Strategies, tactics, logic and framework
Build a strategic response to cyber attacks The activities of the cyber criminal are both deliberate …