Cover image for Security Convergence : Managing Enterprise Security Risk.
Security Convergence : Managing Enterprise Security Risk.
Title:
Security Convergence : Managing Enterprise Security Risk.
Author:
Tyson, Dave.
ISBN:
9780080546261
Personal Author:
Physical Description:
1 online resource (232 pages)
Contents:
Front Cover -- Security Convergence -- Copyright Page -- Table of Contents -- Foreword -- Preface -- Acknowledgments -- Introduction -- Section 1: Security To Date -- Chapter 1: What is Security Convergence? -- Key Concepts of Security Convergence -- References -- Chapter 2: Why Should You Care? -- Rapid Expansion of the Enterprise Ecosystem -- Value Migration from Physical to Information-Based and Intangible Assets -- New Protective Technologies are Blurring Functional Boundaries -- New Compliance And Regulatory Regimes -- Continuing Pressure To Reduce Cost -- Why Should You Really Care? -- References -- Chapter 3: Cultural Differences -- Social Differences -- Physical Security Departments -- Information Technology Security Departments -- Reference -- Section 2: The Changing of The Guard -- Chapter 4: Changing the Threat Paradigm -- Chapter 5: Changing the Security Environment -- The Threats have Converged -- Security Governance Structures -- Chapter 6: Changing the Business Model -- Chapter 7: The Ever-Advancing Microchip -- Quantum Computing -- Reference -- Chapter 8: Leveraging Technology -- Velocity of Recovery -- References -- Section 3: The New World -- Chapter 9: Disruptive Technology and Other Stuff -- Access to Information is Easier -- Massive Distribution and A Global Footprint -- Ability to Automate Attacks -- Interconnectivity of Devices -- Massive Reliance on Homogeneous Protocols -- Very Few End-To-End Security Solutions -- Historical Measurements of Business Success are Based on Quarterly Profit and Revenue -- The Need to Feed the Beast -- Chapter 10: The Need for Education -- Chapter 11: Cyber Crime: A Pervasive Threat -- Reference -- Chapter 12: How These Groups Can Help Each Other -- Section 4: Getting From Here To There -- Chapter 13: How to Change -- Acquire an Executive-Level Sponsor -- Draft the New Vision.

Have a Solid Change Management Plan -- Attain Senior Management Buy-In -- Strategic Review or Inventory of Assets -- Completely Separate Networks -- Chapter 14: The Process Approach -- Chapter 15: The Organization Size Approach -- Small Companies -- Medium-Sized Organizations -- Large Organizations -- Investigations -- Chapter 16: The Methodological Approach -- Step 1. Project Kick-Off Meeting -- Step 2. Data Gathering -- Step 3. Information Analysis -- Step 4. Solution Design -- Step 5. Recommendations -- Step 6. Stakeholder Education Sessions -- Step 7. Quick Wins -- Step 8. Do Not Get Married to the Whole Idea of Convergence -- Step 9. Training -- Chapter 17: Potential Benefits -- Risk Factors -- Business Process Factors -- Human Factors -- Chapter 18: Security Convergence as Strategic Differentiator -- Reference -- Chapter 19: The Human Resources Perspective -- Meeting the Human Resource Challenges of a Converged Organization -- The "Converged Chief Security Officer" -- Recruiting and Selecting the Right Chief Security Officer -- Building the Converged Security Department -- Different Perspectives, Different Questions -- Section 5: Sustainability -- Chapter 20: Integrated Threat and Event Reporting -- Chapter 21: Change Management -- Chapter 22: Resistance -- 1. The Chance is Not Tied to Overall Strategy -- 2. The Change Process Suffers from A Lack of Leadership -- 3. Institutional Memory is Blocking the Change -- 4. Internal Political Realities -- 5. Project Complexity -- 6. Fear -- 7. Perception -- 8. Rigid Change Design -- 9. Lack of Metrics Extolling Results -- Chapter 23: Lessons Learned About Convergence -- Pick The Low-Hanging Fruit -- Vision -- Communication -- Convergence Strategy -- Eat Your Young Early, When They are Juicy and Tender -- Creativity is Crucial -- Education and Training -- Change Management -- Emotional Sustainment.

Jettison the Deadwood -- Section 6: Wrapping it All Up -- Chapter 24: The Case for Security and Convergence -- Expected Impact of this Approach -- References -- Chapter 25: A Model for Moving Forward -- Checklist for Security Convergence -- Other Reminders -- Index.
Abstract:
Security Convergence describes the movement in business to combine the roles of physical security and security management with network computer security measures within an organization. This is the first book to discuss the subject of security convergence, providing real-world illustrations of implementation and the cost-saving benefits that result. Security Convergence discusses security management, electronic security solutions, and network security and the manner in which all of these interact. Combining security procedures and arriving at complete security solutions improves efficiency, greatly improves security, and saves companies money. Implementation of convergence principles has increased rapidly and the number of businesses moving to this model will continue to grow over the next few years. All security professionals, regardless of background, will find this a useful reference and a practical look at the benefits of convergence and a look to the future of how organizations and corporations will protect their assets. * A high-level, manager's overview of the movement in corporations to combine the physical and IT Security functions * Details the challenges and benefits of convergence with an assessment of the future outlook for this growing industry trend * Contains case examples that detail how convergence can be implemented to save money and improve efficiencies.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: