Overview
Helps you identify and prioritize business functions and the assets that support them so you can build an effective protective security strategy
Shows you how to detect and defend the assets that would cause the greatest impact to your organization if they were to be compromised
Teaches you how to develop a robust security culture through proactive engagement with your business’ personnel assets
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (15 chapters)
Keywords
- Protective Security
- Risk Management
- Business Information Security
- Data Privacy
- Data Protection
- Secure eCommerce
- Mobile Security
- Information Systems Security
- Industrial Systems Security
- Personnel Security
- Supply Chain Security
- Cybersecurity
- Physical Security
- Secure Network Architecture
- Insider Threat
- Cyber Defense
- Information Security
About this book
This book shows you how military counter-intelligence principles and objectives are applied. It provides you with valuable advice and guidance to help your business understand threat vectors and the measures needed to reduce the risks and impacts to your organization. You will know how business-critical assets are compromised: cyberattack, data breach, system outage, pandemic, natural disaster, and many more.
Rather than being compliance-concentric, this book focuses on how your business can identify the assets that are most valuable to your organization and the threat vectors associated with these assets. You will learn how to apply appropriate mitigation controls to reduce the risks within suitable tolerances.
You will gain a comprehensive understanding of the value that effective protective security provides and how to develop an effective strategy for your type of business.
What You Will Learn
- Take a deep dive into legal and regulatory perspectives and how an effective protective security strategy can help fulfill these ever-changing requirements
- Know where compliance fits into a company-wide protective security strategy
- Secure your digital footprint
- Build effective 5 D network architectures: Defend, detect, delay, disrupt, deter
- Secure manufacturing environments to balance a minimal impact on productivity
- Securing your supply chains and the measures needed to ensure that risks are minimized
Who This Book Is For
Business owners, C-suite, information security practitioners, CISOs, cybersecurity practitioners, risk managers, IT operations managers, IT auditors, and military enthusiasts
Authors and Affiliations
About the author
Jim (James) Seaman has been dedicated to the pursuit of security for his entire adult life. He served 22 years in the RAF Police, covering a number of specialist areas (physical security, aviation security, information security management, IT security management, cyber security management, security investigations, intelligence operations, incident response and disaster recovery), before successfully transitioning his skills to corporate environments (financial services, banking, retail, manufacturing, ecommerce, marketing, etc.) to help businesses enhance their cyber/InfoSec defensive measures working with various industry security standards.
Bibliographic Information
Book Title: Protective Security
Book Subtitle: Creating Military-Grade Defenses for Your Digital Business
Authors: Jim Seaman
DOI: https://doi.org/10.1007/978-1-4842-6908-4
Publisher: Apress Berkeley, CA
eBook Packages: Professional and Applied Computing, Professional and Applied Computing (R0), Apress Access Books
Copyright Information: Jim Seaman 2021
Softcover ISBN: 978-1-4842-6907-7Published: 10 April 2021
eBook ISBN: 978-1-4842-6908-4Published: 09 April 2021
Edition Number: 1
Number of Pages: XXIX, 743
Number of Illustrations: 33 b/w illustrations, 440 illustrations in colour
Topics: Systems and Data Security