Achieving and Sustaining Secured Business Operations An Executive’s Guide to Planning and Management /

Proactively plan and manage innovation in your business while keeping operations safe and secure. This book provides a framework and practices to help you safeguard customer information, prevent unauthorized access, and protect your brand and assets. Securing company operations is a board-level disc...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριοι συγγραφείς: Ajmani, Neelesh (Συγγραφέας), Kumar, Dinesh (Συγγραφέας)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berkeley, CA : Apress : Imprint: Apress, 2017.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 03393nam a22004335i 4500
001 978-1-4842-3099-2
003 DE-He213
005 20171207163133.0
007 cr nn 008mamaa
008 171207s2017 xxu| s |||| 0|eng d
020 |a 9781484230992  |9 978-1-4842-3099-2 
024 7 |a 10.1007/978-1-4842-3099-2  |2 doi 
040 |d GrThAP 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
100 1 |a Ajmani, Neelesh.  |e author. 
245 1 0 |a Achieving and Sustaining Secured Business Operations  |h [electronic resource] :  |b An Executive’s Guide to Planning and Management /  |c by Neelesh Ajmani, Dinesh Kumar. 
264 1 |a Berkeley, CA :  |b Apress :  |b Imprint: Apress,  |c 2017. 
300 |a XVIII, 168 p. 39 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Chapter 1: Current Practices -- Chapter 2: Next Practices: Business Centric Security and Risk Management -- Chapter 3: Secured Business Model -- Chapter 4: Secured Operating Model -- Chapter 5: Secured Management Model -- Chapter 6: Securing Effectiveness -- Chapter 7: Making It Real.- . 
520 |a Proactively plan and manage innovation in your business while keeping operations safe and secure. This book provides a framework and practices to help you safeguard customer information, prevent unauthorized access, and protect your brand and assets. Securing company operations is a board-level discussion. Across all industries, companies are pouring millions of dollars into taming cybercrime and other related security crime. Achieving and Sustaining Secured Business Operations presents a holistic approach looking top down, bottom up, and sideways. The end goal is to achieve and sustain a safe environment to conduct secured business operations while continuously innovating for competitive advantage. What You’ll Learn: Discover why security, specifically secured business operations, needs to be part of business planning and oversight by design and not left to technologists to make the business case Determine what you can do in your role and in your organization to drive and implement integration and improvements in planning and managing secured business operations in conjunction with other business planning and management activities Choose ways in which progress toward achieving and sustaining secured business operations can be measured Understand best practices for organizing, planning, architecting, governing, monitoring, and managing secured business operations Create a framework, including methods and tools for operationalizing assessment, planning, and ongoing management of secured business operations Use cases and potential case studies for various industries and business models. 
650 0 |a Computer science. 
650 0 |a Computer security. 
650 1 4 |a Computer Science. 
650 2 4 |a Systems and Data Security. 
700 1 |a Kumar, Dinesh.  |e author. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9781484230985 
856 4 0 |u http://dx.doi.org/10.1007/978-1-4842-3099-2  |z Full Text via HEAL-Link 
912 |a ZDB-2-CWD 
950 |a Professional and Applied Computing (Springer-12059)