Security Strategy

Book description

Addressing the diminished understanding of the value of security on the executive side and a lack of good business processes on the security side, Security Strategy: From Requirements to Reality explains how to select, develop, and deploy the security strategy best suited to your organization. It clarifies the purpose and place of strategy in an in

Table of contents

  1. Front cover
  2. Dedication
  3. Contents (1/2)
  4. Contents (2/2)
  5. Acknowledgments
  6. Introduction
  7. Preface
  8. Authors
  9. Section I. STRATEGY
  10. Chapter 1. Strategy: An Introduction (1/3)
  11. Chapter 1. Strategy: An Introduction (2/3)
  12. Chapter 1. Strategy: An Introduction (3/3)
  13. Chapter 2. Getting to the Big Picture (1/5)
  14. Chapter 2. Getting to the Big Picture (2/5)
  15. Chapter 2. Getting to the Big Picture (3/5)
  16. Chapter 2. Getting to the Big Picture (4/5)
  17. Chapter 2. Getting to the Big Picture (5/5)
  18. Chapter 3. Testing the Consumer (1/3)
  19. Chapter 3. Testing the Consumer (2/3)
  20. Chapter 3. Testing the Consumer (3/3)
  21. Chapter 4. Strategic Framework (Inputs to Strategic Planning) (1/4)
  22. Chapter 4. Strategic Framework (Inputs to Strategic Planning) (2/4)
  23. Chapter 4. Strategic Framework (Inputs to Strategic Planning) (3/4)
  24. Chapter 4. Strategic Framework (Inputs to Strategic Planning) (4/4)
  25. Chapter 5. Developing a Strategic Planning Process (1/4)
  26. Chapter 5. Developing a Strategic Planning Process (2/4)
  27. Chapter 5. Developing a Strategic Planning Process (3/4)
  28. Chapter 5. Developing a Strategic Planning Process (4/4)
  29. Chapter 6. Gates, Geeks, and Guards (Security Convergence) (1/2)
  30. Chapter 6. Gates, Geeks, and Guards (Security Convergence) (2/2)
  31. Section II. TACTICS
  32. Chapter 7. Tactics: An Introduction (1/4)
  33. Chapter 7. Tactics: An Introduction (2/4)
  34. Chapter 7. Tactics: An Introduction (3/4)
  35. Chapter 7. Tactics: An Introduction (4/4)
  36. Chapter 8. Layer upon Layer (Defense in Depth) (1/5)
  37. Chapter 8. Layer upon Layer (Defense in Depth) (2/5)
  38. Chapter 8. Layer upon Layer (Defense in Depth) (3/5)
  39. Chapter 8. Layer upon Layer (Defense in Depth) (4/5)
  40. Chapter 8. Layer upon Layer (Defense in Depth) (5/5)
  41. Chapter 9. Did You See That! (Observation) (1/6)
  42. Chapter 9. Did You See That! (Observation) (2/6)
  43. Chapter 9. Did You See That! (Observation) (3/6)
  44. Chapter 9. Did You See That! (Observation) (4/6)
  45. Chapter 9. Did You See That! (Observation) (5/6)
  46. Chapter 9. Did You See That! (Observation) (6/6)
  47. Chapter 10. Trust but Verify (Accountability) (1/4)
  48. Chapter 10. Trust but Verify (Accountability) (2/4)
  49. Chapter 10. Trust but Verify (Accountability) (3/4)
  50. Chapter 10. Trust but Verify (Accountability) (4/4)
  51. Chapter 11. SDL and Incident Response (1/8)
  52. Chapter 11. SDL and Incident Response (2/8)
  53. Chapter 11. SDL and Incident Response (3/8)
  54. Chapter 11. SDL and Incident Response (4/8)
  55. Chapter 11. SDL and Incident Response (5/8)
  56. Chapter 11. SDL and Incident Response (6/8)
  57. Chapter 11. SDL and Incident Response (7/8)
  58. Chapter 11. SDL and Incident Response (8/8)
  59. Chapter 12. Keep Your Enemies Closer (1/6)
  60. Chapter 12. Keep Your Enemies Closer (2/6)
  61. Chapter 12. Keep Your Enemies Closer (3/6)
  62. Chapter 12. Keep Your Enemies Closer (4/6)
  63. Chapter 12. Keep Your Enemies Closer (5/6)
  64. Chapter 12. Keep Your Enemies Closer (6/6)
  65. Chapter 13. Hire a Hessian (Outsourcing) (1/5)
  66. Chapter 13. Hire a Hessian (Outsourcing) (2/5)
  67. Chapter 13. Hire a Hessian (Outsourcing) (3/5)
  68. Chapter 13. Hire a Hessian (Outsourcing) (4/5)
  69. Chapter 13. Hire a Hessian (Outsourcing) (5/5)
  70. Chapter 14. Security Awareness Training (1/4)
  71. Chapter 14. Security Awareness Training (2/4)
  72. Chapter 14. Security Awareness Training (3/4)
  73. Chapter 14. Security Awareness Training (4/4)
  74. References (1/2)
  75. References (2/2)
  76. Appendix (1/2)
  77. Appendix (2/2)
  78. Index (1/2)
  79. Index (2/2)
  80. Back cover

Product information

  • Title: Security Strategy
  • Author(s): Bill Stackpole, Eric Oksendahl
  • Release date: October 2010
  • Publisher(s): Auerbach Publications
  • ISBN: 9781439827345