How to Develop and Implement a Security Master Plan

個数:

How to Develop and Implement a Security Master Plan

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Hardcover:ハードカバー版/ページ数 374 p.
  • 言語 ENG
  • 商品コード 9781420086256
  • DDC分類 658.47

基本説明

A valuable reference tool for security professionals of both amall and large corporations as well as for consultants in the field.

Full Description

Engage Stakeholders with a Long-Term Solution

The goal: Convince executive management to "buy in" to your security program, support it, and provide the largest possible amount of funding.

The solution: Develop a meticulously detailed long-term plan that sells decision-makers on the dire need for your program, and then maps out its direction and required budget.

Assess and Outline Security Risks to Map Out Mitigation Strategies
This practical guide details how to construct a customized, comprehensive five-year corporate security plan that synchronizes with the strategies of any business or institution. The author explains how to develop a plan and implementation strategy that aligns with an organization's particular philosophies, strategies, goals, programs, and processes. Readers learn how to outline risks and then formulate appropriate mitigation strategies. This guide provides tested, real-world solutions on how to:




Conduct an effective, efficient assessment of the site and security personnel, meticulously addressing the particular needs of many different environments



Make decisions about security philosophies, strategies, contract relationships, technology, and equipment replacement



Interview executive and security management to determine their concerns, educate them, and ensure that they buy in to your plan



Use all gathered data to construct and finalize the Security Master Plan and then implement it into the management of the business

Apply Insights from an Expert with Global Experience at the Highest Level
Author Tim Giles worked at IBM for 31 years serving as Director of Security for the company's operations in the United States and Canada, as well as Latin America and Asia-Pacific. His immeasurable experience and insight provide readers with an extraordinarily comprehensive understanding that they can use to design and execute a highly effective, tailored security program.

Contents

The Business of Security. Evaluate the Business's Risks. Conducting a Site Security Assessment — Part 1. Conducting a Site Security Assessment — Part 2. Conducting a Site Security Assessment — Part 3. Conducting a Site Security Assessment — Part 4. Conducting an Assessment of the Security Organization. Determining What Prevention, Crisis Management, and Recovery Programs Exist. Interviewing Executive and Security Management. Review and Evaluate All Security-Related Contracts and the Information Protection Program. Constructing the Security Master Plan Document. Typical Contents of a Security Master Plan. Finalizing the Security Master Plan Process. Utilizing Your Plan in Managing Your Business. Appendices.

最近チェックした商品