Physical and Logical Security Convergence: Powered By Enterprise Security Management
()
About this ebook
This book begins with an overall explanation of information security, physical security, and why approaching these two different types of security in one way (called convergence) is so critical in today’s changing security landscape. It then details enterprise security management as it relates to incident detection and incident management. This is followed by detailed examples of implementation, taking the reader through cases addressing various physical security technologies such as: video surveillance, HVAC, RFID, access controls, biometrics, and more.
- This topic is picking up momentum every day with every new computer exploit, announcement of a malicious insider, or issues related to terrorists, organized crime, and nation-state threats
- The author has over a decade of real-world security and management expertise developed in some of the most sensitive and mission-critical environments in the world
- Enterprise Security Management (ESM) is deployed in tens of thousands of organizations worldwide
Brian T Contos
Brian T. Contos, CISSP, Chief Security Officer, ArcSight Inc. has over a decade of real-world security engineering and management expertise developed in some of the most sensitive and mission-critical environments in the world. As ArcSight's CSO he advises government organizations and Global 1,000s on security strategy related to Enterprise Security Management (ESM) solutions while being an evangelist for the security space. He has delivered security-related speeches, white papers, webcasts, podcasts and most recently published a book on insider threats titled – Enemy at the Water Cooler. He frequently appears in media outlets including: Forbes, The London Times, Computerworld, SC Magazine, Tech News World, Financial Sector Technology and the Sarbanes-Oxley Compliance Journal. Mr. Contos has held management and engineering positions at Riptech, Lucent Bell Labs, Compaq Computers and the Defense Information Systems Agency (DISA). He has worked throughout North America, South America, Western Europe, and Asia and holds a B.S. from the University of Arizona in addition to a number of industry and vendor certifications.
Related to Physical and Logical Security Convergence
Related ebooks
Becoming a Global Chief Security Executive Officer: A How to Guide for Next Generation Security Leaders Rating: 5 out of 5 stars5/5Building a Practical Information Security Program Rating: 5 out of 5 stars5/5Security Leader Insights for Success: Lessons and Strategies from Leading Security Professionals Rating: 0 out of 5 stars0 ratingsSecurity Operations in Practice Rating: 0 out of 5 stars0 ratingsSecurity Assessment: Case Studies for Implementing the NSA IAM Rating: 3 out of 5 stars3/5Security Convergence: Managing Enterprise Security Risk Rating: 0 out of 5 stars0 ratingsNetwork Security Assessment: From Vulnerability to Patch Rating: 0 out of 5 stars0 ratingsData Breach Preparation and Response: Breaches are Certain, Impact is Not Rating: 0 out of 5 stars0 ratingsCybersecurity ABCs: Delivering awareness, behaviours and culture change Rating: 0 out of 5 stars0 ratingsIntrusion Prevention and Active Response: Deploying Network and Host IPS Rating: 3 out of 5 stars3/5Security Sage's Guide to Hardening the Network Infrastructure Rating: 0 out of 5 stars0 ratings8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Rating: 0 out of 5 stars0 ratingsAVIEN Malware Defense Guide for the Enterprise Rating: 0 out of 5 stars0 ratings7 Rules to Influence Behaviour and Win at Cyber Security Awareness Rating: 5 out of 5 stars5/5How to Define and Build an Effective Cyber Threat Intelligence Capability Rating: 4 out of 5 stars4/5Building an Intelligence-Led Security Program Rating: 5 out of 5 stars5/5Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents Rating: 0 out of 5 stars0 ratingsPhysical Security Professional A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsComputer Incident Response and Forensics Team Management: Conducting a Successful Incident Response Rating: 4 out of 5 stars4/5Physical Security: 150 Things You Should Know Rating: 0 out of 5 stars0 ratingsKeeping Religious Institutions Secure Rating: 0 out of 5 stars0 ratingsPhysical Security Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsSecurity Leader Insights for Effective Management: Lessons and Strategies from Leading Security Professionals Rating: 0 out of 5 stars0 ratingsSecurity Supervision and Management: Theory and Practice of Asset Protection Rating: 4 out of 5 stars4/5Corporate Security Management: Challenges, Risks, and Strategies Rating: 5 out of 5 stars5/5Cybersecurity for Small Businesses and Nonprofits Rating: 0 out of 5 stars0 ratingsCybersecurity Risk Management A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsSecurity Risk Assessment: Managing Physical and Operational Security Rating: 5 out of 5 stars5/5Cybersecurity Operations Handbook Rating: 5 out of 5 stars5/5
Crime & Violence For You
Gavin de Becker’s The Gift of Fear Survival Signals That Protect Us From Violence | Summary Rating: 4 out of 5 stars4/5Homicide: A Year on the Killing Streets Rating: 4 out of 5 stars4/5Evidence of Love: A True Story of Passion and Death in the Suburbs Rating: 4 out of 5 stars4/5The Madness of Crowds: Gender, Race and Identity Rating: 4 out of 5 stars4/5Dreamland: The True Tale of America's Opiate Epidemic Rating: 4 out of 5 stars4/5On Killing: The Psychological Cost of Learning to Kill in War and Society Rating: 4 out of 5 stars4/5Bloodbath Nation Rating: 3 out of 5 stars3/5Batman and Psychology: A Dark and Stormy Knight (2nd Edition) Rating: 0 out of 5 stars0 ratingsSlenderman: Online Obsession, Mental Illness, and the Violent Crime of Two Midwestern Girls Rating: 4 out of 5 stars4/5The Man from the Train: The Solving of a Century-Old Serial Killer Mystery Rating: 4 out of 5 stars4/5No Visible Bruises: What We Don’t Know About Domestic Violence Can Kill Us Rating: 5 out of 5 stars5/5Chasing the Scream: The Inspiration for the Feature Film "The United States vs. Billie Holiday" Rating: 4 out of 5 stars4/5The Devil You Know: Encounters in Forensic Psychiatry Rating: 4 out of 5 stars4/5Death Row, Texas: Inside the Execution Chamber Rating: 4 out of 5 stars4/5They Thought They Were Free: The Germans, 1933–45 Rating: 4 out of 5 stars4/5Ordinary Men: Reserve Police Battalion 101 and the Final Solution in Poland Rating: 4 out of 5 stars4/5Regarding the Pain of Others Rating: 4 out of 5 stars4/5Whoever Fights Monsters: My Twenty Years Tracking Serial Killers for the FBI Rating: 4 out of 5 stars4/5And The Mountains Echoed Rating: 2 out of 5 stars2/5No Stone Unturned: The True Story of the World's Premier Forensic Investigators Rating: 4 out of 5 stars4/5Manson: The Life and Times of Charles Manson Rating: 4 out of 5 stars4/5Tell Your Children: The Truth About Marijuana, Mental Illness, and Violence Rating: 3 out of 5 stars3/5Murder at McDonald's: The Killers Next Door Rating: 4 out of 5 stars4/5The New Jim Crow Study Guide and Call to Action Rating: 5 out of 5 stars5/5The Least of Us: True Tales of America and Hope in the Time of Fentanyl and Meth Rating: 4 out of 5 stars4/5The Enigma of Ted Bundy: The Questions and Controversies Surrounding America's Most Infamous Serial Killer Rating: 5 out of 5 stars5/5Worse Than Slavery Rating: 4 out of 5 stars4/5Dying for Daddy: The True Story of a Family's Worst Nightmare Rating: 4 out of 5 stars4/5The Violent Abuse of Women: In 17th and 18th Century Britain Rating: 4 out of 5 stars4/5
Reviews for Physical and Logical Security Convergence
0 ratings0 reviews