Physical and Logical Security Convergence: Powered By Enterprise Security Management
()
About this ebook
This book begins with an overall explanation of information security, physical security, and why approaching these two different types of security in one way (called convergence) is so critical in today’s changing security landscape. It then details enterprise security management as it relates to incident detection and incident management. This is followed by detailed examples of implementation, taking the reader through cases addressing various physical security technologies such as: video surveillance, HVAC, RFID, access controls, biometrics, and more.
- This topic is picking up momentum every day with every new computer exploit, announcement of a malicious insider, or issues related to terrorists, organized crime, and nation-state threats
- The author has over a decade of real-world security and management expertise developed in some of the most sensitive and mission-critical environments in the world
- Enterprise Security Management (ESM) is deployed in tens of thousands of organizations worldwide
Brian T Contos
Brian T. Contos, CISSP, Chief Security Officer, ArcSight Inc. has over a decade of real-world security engineering and management expertise developed in some of the most sensitive and mission-critical environments in the world. As ArcSight's CSO he advises government organizations and Global 1,000s on security strategy related to Enterprise Security Management (ESM) solutions while being an evangelist for the security space. He has delivered security-related speeches, white papers, webcasts, podcasts and most recently published a book on insider threats titled – Enemy at the Water Cooler. He frequently appears in media outlets including: Forbes, The London Times, Computerworld, SC Magazine, Tech News World, Financial Sector Technology and the Sarbanes-Oxley Compliance Journal. Mr. Contos has held management and engineering positions at Riptech, Lucent Bell Labs, Compaq Computers and the Defense Information Systems Agency (DISA). He has worked throughout North America, South America, Western Europe, and Asia and holds a B.S. from the University of Arizona in addition to a number of industry and vendor certifications.
Related to Physical and Logical Security Convergence
Related ebooks
Becoming a Global Chief Security Executive Officer: A How to Guide for Next Generation Security Leaders Rating: 5 out of 5 stars5/5Security Convergence: Managing Enterprise Security Risk Rating: 0 out of 5 stars0 ratingsBuilding a Practical Information Security Program Rating: 5 out of 5 stars5/5AVIEN Malware Defense Guide for the Enterprise Rating: 0 out of 5 stars0 ratingsHow to Define and Build an Effective Cyber Threat Intelligence Capability Rating: 4 out of 5 stars4/5The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer Rating: 0 out of 5 stars0 ratingsSecurity Operations in Practice Rating: 0 out of 5 stars0 ratingsSecurity Assessment: Case Studies for Implementing the NSA IAM Rating: 3 out of 5 stars3/5Intrusion Prevention and Active Response: Deploying Network and Host IPS Rating: 3 out of 5 stars3/5Botnets: The Killer Web Applications Rating: 5 out of 5 stars5/57 Rules to Influence Behaviour and Win at Cyber Security Awareness Rating: 5 out of 5 stars5/5Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents Rating: 0 out of 5 stars0 ratingsSnort Intrusion Detection 2.0 Rating: 4 out of 5 stars4/5Building an Intelligence-Led Security Program Rating: 5 out of 5 stars5/5Combat Ready IT and PIE: Cyber Security for Small Medium Business and Perpetual Improvement Everywhe Rating: 5 out of 5 stars5/5Data Breach Preparation and Response: Breaches are Certain, Impact is Not Rating: 0 out of 5 stars0 ratingsSecurity Leader Insights for Success: Lessons and Strategies from Leading Security Professionals Rating: 0 out of 5 stars0 ratingsBlack Hat Physical Device Security: Exploiting Hardware and Software: Exploiting Hardware and Software Rating: 4 out of 5 stars4/5Designing and Building Security Operations Center Rating: 3 out of 5 stars3/5Corporate Security Management: Challenges, Risks, and Strategies Rating: 5 out of 5 stars5/5Physical Security Professional A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsThe Security Consultant's Handbook Rating: 0 out of 5 stars0 ratingsPhysical Security Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsInformation Assurance: Dependability and Security in Networked Systems Rating: 5 out of 5 stars5/5Physical Security: 150 Things You Should Know Rating: 0 out of 5 stars0 ratingsThe Manager's Handbook for Business Security Rating: 0 out of 5 stars0 ratingsCyber Security Threat Intelligence A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsImplementing Digital Forensic Readiness: From Reactive to Proactive Process Rating: 0 out of 5 stars0 ratingsPhysical Security for IT Rating: 5 out of 5 stars5/5Physical Security Strategy and Process Playbook Rating: 0 out of 5 stars0 ratings
Crime & Violence For You
Summary of The 33 Strategies of War: by Robert Greene - A Comprehensive Summary Rating: 0 out of 5 stars0 ratingsThe Man from the Train: The Solving of a Century-Old Serial Killer Mystery Rating: 4 out of 5 stars4/5Grilling Dahmer: The Interrogation Of "The Milwaukee Cannibal" Rating: 5 out of 5 stars5/5Introduction to Conducting Private Investigations: Private Investigator Entry Level (02E) Rating: 5 out of 5 stars5/5Batman and Psychology: A Dark and Stormy Knight (2nd Edition) Rating: 0 out of 5 stars0 ratingsWorse Than Slavery Rating: 4 out of 5 stars4/5400 Things Cops Know: Street-Smart Lessons from a Veteran Patrolman Rating: 4 out of 5 stars4/5The Enigma of Ted Bundy: The Questions and Controversies Surrounding America's Most Infamous Serial Killer Rating: 5 out of 5 stars5/5No Stone Unturned: The True Story of the World's Premier Forensic Investigators Rating: 4 out of 5 stars4/5Slenderman: Online Obsession, Mental Illness, and the Violent Crime of Two Midwestern Girls Rating: 4 out of 5 stars4/5The Violent Abuse of Women: In 17th and 18th Century Britain Rating: 4 out of 5 stars4/5Out of the Mouths of Serial Killers Rating: 4 out of 5 stars4/5The Devil You Know: Encounters in Forensic Psychiatry Rating: 4 out of 5 stars4/5No Visible Bruises: What We Don’t Know About Domestic Violence Can Kill Us Rating: 5 out of 5 stars5/5House of Secrets Rating: 4 out of 5 stars4/5Savage Appetites: Four True Stories of Women, Crime, and Obsession Rating: 4 out of 5 stars4/5Lost Girls: The Unsolved American Mystery of the Gilgo Beach Serial Killer Murders Rating: 4 out of 5 stars4/5Bloodbath Nation Rating: 3 out of 5 stars3/5Gavin de Becker’s The Gift of Fear Survival Signals That Protect Us From Violence | Summary Rating: 4 out of 5 stars4/5Manson: The Life and Times of Charles Manson Rating: 4 out of 5 stars4/5On Killing: The Psychological Cost of Learning to Kill in War and Society Rating: 4 out of 5 stars4/5Black Dahlia Avenger: A Genius for Murder: The True Story Rating: 5 out of 5 stars5/5Homicide: A Year on the Killing Streets Rating: 4 out of 5 stars4/5And The Mountains Echoed Rating: 2 out of 5 stars2/5The Least of Us: True Tales of America and Hope in the Time of Fentanyl and Meth Rating: 4 out of 5 stars4/5The Best New True Crime Stories: Small Towns Rating: 3 out of 5 stars3/5The Trial of Lizzie Borden Rating: 4 out of 5 stars4/5Evidence of Love: A True Story of Passion and Death in the Suburbs Rating: 4 out of 5 stars4/5Regarding the Pain of Others Rating: 4 out of 5 stars4/5
Reviews for Physical and Logical Security Convergence
0 ratings0 reviews