Book description
Addressing the diminished understanding of the value of security on the executive side and a lack of good business processes on the security side, Security Strategy: From Requirements to Reality explains how to select, develop, and deploy the security strategy best suited to your organization. It clarifies the purpose and place of strategy in an in
Table of contents
- Front cover
- Dedication
- Contents (1/2)
- Contents (2/2)
- Acknowledgments
- Introduction
- Preface
- Authors
- Section I. STRATEGY
- Chapter 1. Strategy: An Introduction (1/3)
- Chapter 1. Strategy: An Introduction (2/3)
- Chapter 1. Strategy: An Introduction (3/3)
- Chapter 2. Getting to the Big Picture (1/5)
- Chapter 2. Getting to the Big Picture (2/5)
- Chapter 2. Getting to the Big Picture (3/5)
- Chapter 2. Getting to the Big Picture (4/5)
- Chapter 2. Getting to the Big Picture (5/5)
- Chapter 3. Testing the Consumer (1/3)
- Chapter 3. Testing the Consumer (2/3)
- Chapter 3. Testing the Consumer (3/3)
- Chapter 4. Strategic Framework (Inputs to Strategic Planning) (1/4)
- Chapter 4. Strategic Framework (Inputs to Strategic Planning) (2/4)
- Chapter 4. Strategic Framework (Inputs to Strategic Planning) (3/4)
- Chapter 4. Strategic Framework (Inputs to Strategic Planning) (4/4)
- Chapter 5. Developing a Strategic Planning Process (1/4)
- Chapter 5. Developing a Strategic Planning Process (2/4)
- Chapter 5. Developing a Strategic Planning Process (3/4)
- Chapter 5. Developing a Strategic Planning Process (4/4)
- Chapter 6. Gates, Geeks, and Guards (Security Convergence) (1/2)
- Chapter 6. Gates, Geeks, and Guards (Security Convergence) (2/2)
- Section II. TACTICS
- Chapter 7. Tactics: An Introduction (1/4)
- Chapter 7. Tactics: An Introduction (2/4)
- Chapter 7. Tactics: An Introduction (3/4)
- Chapter 7. Tactics: An Introduction (4/4)
- Chapter 8. Layer upon Layer (Defense in Depth) (1/5)
- Chapter 8. Layer upon Layer (Defense in Depth) (2/5)
- Chapter 8. Layer upon Layer (Defense in Depth) (3/5)
- Chapter 8. Layer upon Layer (Defense in Depth) (4/5)
- Chapter 8. Layer upon Layer (Defense in Depth) (5/5)
- Chapter 9. Did You See That! (Observation) (1/6)
- Chapter 9. Did You See That! (Observation) (2/6)
- Chapter 9. Did You See That! (Observation) (3/6)
- Chapter 9. Did You See That! (Observation) (4/6)
- Chapter 9. Did You See That! (Observation) (5/6)
- Chapter 9. Did You See That! (Observation) (6/6)
- Chapter 10. Trust but Verify (Accountability) (1/4)
- Chapter 10. Trust but Verify (Accountability) (2/4)
- Chapter 10. Trust but Verify (Accountability) (3/4)
- Chapter 10. Trust but Verify (Accountability) (4/4)
- Chapter 11. SDL and Incident Response (1/8)
- Chapter 11. SDL and Incident Response (2/8)
- Chapter 11. SDL and Incident Response (3/8)
- Chapter 11. SDL and Incident Response (4/8)
- Chapter 11. SDL and Incident Response (5/8)
- Chapter 11. SDL and Incident Response (6/8)
- Chapter 11. SDL and Incident Response (7/8)
- Chapter 11. SDL and Incident Response (8/8)
- Chapter 12. Keep Your Enemies Closer (1/6)
- Chapter 12. Keep Your Enemies Closer (2/6)
- Chapter 12. Keep Your Enemies Closer (3/6)
- Chapter 12. Keep Your Enemies Closer (4/6)
- Chapter 12. Keep Your Enemies Closer (5/6)
- Chapter 12. Keep Your Enemies Closer (6/6)
- Chapter 13. Hire a Hessian (Outsourcing) (1/5)
- Chapter 13. Hire a Hessian (Outsourcing) (2/5)
- Chapter 13. Hire a Hessian (Outsourcing) (3/5)
- Chapter 13. Hire a Hessian (Outsourcing) (4/5)
- Chapter 13. Hire a Hessian (Outsourcing) (5/5)
- Chapter 14. Security Awareness Training (1/4)
- Chapter 14. Security Awareness Training (2/4)
- Chapter 14. Security Awareness Training (3/4)
- Chapter 14. Security Awareness Training (4/4)
- References (1/2)
- References (2/2)
- Appendix (1/2)
- Appendix (2/2)
- Index (1/2)
- Index (2/2)
- Back cover
Product information
- Title: Security Strategy
- Author(s):
- Release date: October 2010
- Publisher(s): Auerbach Publications
- ISBN: 9781439827345
You might also like
book
The Official (ISC)2 Guide to the CISSP CBK Reference, 5th Edition
The only official, comprehensive reference guide to the CISSP All new for 2019 and beyond, this …
book
The Cyber Risk Handbook
Actionable guidance and expert perspective for real-world cybersecurity The Cyber Risk Handbook is the practitioner's guide …
book
CEH Certified Ethical Hacker All-in-One Exam Guide, Fourth Edition, 4th Edition
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, …
book
How to Measure Anything in Cybersecurity Risk
A ground shaking exposé on the failure of popular cyber risk management methods How to Measure …