
Building a Corporate Culture of Security
Strategies for Strengthening Organizational Resiliency
- 298 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Building a Corporate Culture of Security
Strategies for Strengthening Organizational Resiliency
About this book
Building a Corporate Culture of Security: Strategies for Strengthening Organizational Resiliency provides readers with the proven strategies, methods, and techniques they need to present ideas and a sound business case for improving or enhancing security resilience to senior management. Presented from the viewpoint of a leading expert in the field, the book offers proven and integrated strategies that convert threats, hazards, risks, and vulnerabilities into actionable security solutions, thus enhancing organizational resiliency in ways that executive management will accept.The book delivers a much-needed look into why some corporate security practices programs work and others don't. Offering the tools necessary for anyone in the organization charged with security operations, Building a Corporate Culture of Security provides practical and useful guidance on handling security issues corporate executives hesitate to address until it's too late.- Provides a comprehensive understanding of the root causes of the most common security vulnerabilities that impact organizations and strategies for their early detection and prevention- Offers techniques for security managers on how to establish and maintain effective communications with executives, especially when bringing security weakness--and solutions--to them- Outlines a strategy for determining the value and contribution of protocols to the organization, how to detect gaps, duplications and omissions from those protocols, and how to improve their purpose and usefulness- Explores strategies for building professional competencies; managing security operations, and assessing risks, threats, vulnerabilities, and consequences- Shows how to establish a solid foundation for the layering of security and building a resilient protection-in-depth capability that benefits the entire organization- Offers appendices with proven risk management and risk-based metric frameworks and architecture platforms
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Introduction
Abstract
Keywords
Capitulation; Consequence; Deficiency; Inadequacy; Ineffectiveness; Inefficiency; Resilience; Risk exposure; Vulnerability creep-in; WeaknessOverview
Building Security Resilience and Developing Relationships
But What Do Ability, Capability, and Preparedness Really Mean?
How Do We Relate Security Goals to Business?
Can We Speak Intelligently About the Threat Environment?
Watch Out for Stumbling Blocks
Experience and Knowledge Base of Senior Decision-Makers Can Cause Us to Trip
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Dedication
- About the Author
- Foreword
- Preface
- Acknowledgments
- 1. Introduction
- 2. Strategies That Create Your Life Line
- 3. The Many Faces of Vulnerability Creep-in
- 4. The Evolving Threat Environment
- 5. The Cyber Threat Landscape
- 6. Establishing a Security Risk Management Program Is Crucial
- 7. Useful Metrics Give the Security Organization Standing
- 8. A User-Friendly Security Assessment Model
- 9. Developing a Realistic and Useful Threat Estimate Profile
- 10. Establishing and Maintaining Inseparable Security Competencies
- 11. A User-Friendly Security Technology Model
- 12. Preparing for Emergencies
- 13. A User-Friendly Protocol Development Model
- 14. A Proven Organization and Management Assessment Model
- 15. Building Competencies That Count: A Training Model
- 16. How to Communicate with Executives and Governing Bodies
- 17. A Brighter Tomorrow: My Thoughts
- References
- Index