Achieving and Sustaining Secured Business Operations: An Executive’s Guide to Planning and Management
- Добавил: bhaer
- Дата: 8-12-2017, 09:44
- Комментариев: 0
Название: Achieving and Sustaining Secured Business Operations: An Executive’s Guide to Planning and Management
Автор: Neelesh Ajmani,? Dinesh Kumar
Издательство: Apress
Год: 2018
Страниц: 168
Формат: PDF, EPUB
Размер: 10 Mb
Язык: English
Proactively plan and manage innovation in your business while keeping operations safe and secure. This book provides a framework and practices to help you safeguard customer information, prevent unauthorized access, and protect your brand and assets.
Securing company operations is a board-level discussion. Across all industries, companies are pouring millions of dollars into taming cybercrime and other related security crime. Achieving and Sustaining Secured Business Operations presents a holistic approach looking top down, bottom up, and sideways. The end goal is to achieve and sustain a safe environment to conduct secured business operations while continuously innovating for competitive advantage.
What You’ll Learn
Discover why security, specifically secured business operations, needs to be part of business planning and oversight by design and not left to technologists to make the business case
Determine what you can do in your role and in your organization to drive and implement integration and improvements in planning and managing secured business operations in conjunction with other business planning and management activities
Choose ways in which progress toward achieving and sustaining secured business operations can be measured
Understand best practices for organizing, planning, architecting, governing, monitoring, and managing secured business operations
Create a framework, including methods and tools for operationalizing assessment, planning, and ongoing management of secured business operations
Use cases and potential case studies for various industries and business models
Who This Book Is For
Chief executive officers and their leadership team; chief operations officers; chief information officers and their leadership team; chief information security officers; business functional middle managers; and enterprise, solution, and information technology architects
Внимание
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.