People-Centric Security: Transforming Your Enterprise Security Culture (eBook)

People-Centric Security: Transforming Your Enterprise Security Culture
By:Hayden, Lance;
Pub Date:September 25th 2015
Format:Electronic book text 384 pages
Other Formats: View Print Details
ISBN:0071846794 / 9780071846790
Your Price:$50.00 ADD TO CART
More Information




Main description

A culture hacking how to complete with strategies, techniques, and resources for securing the most volatile element of information security--humans

People-Centric Security: Transforming Your Enterprise Security Culture addresses the urgent need for change at the intersection of people and security. Esentially a complete security culture toolkit, this comprehensive resource provides you with a blueprint for assessing, designing, building, and maintaining human firewalls.

Globally recognized information security expert Lance Hayden lays out a course of action for drastically improving organizations' security cultures through the precise use of mapping, survey, and analysis. You'll discover applied techniques for embedding strong security practices into the daily routines of IT users and learn how to implement a practical, executable, and measurable program for human security.

  • Features downloadable mapping and surveying templates
  • Case studies throughout showcase the methods explained in the book
  • Valuable appendices detail security tools and cultural threat and risk modeling
  • Written by an experienced author and former CIA human intelligence officer


Table of contents

Part I: Understanding Your Security Culture
Chapter 1: Become a Culture Hacker!
Chapter 2: Strategy for Breakfast: The Hidden Power of Security Culture
Chapter 3: Organizational Culture: A Primer
Chapter 4: Security and Organizational Behavior
Part II: Measuring Your Security Culture
Chapter 5: Can Culture Be Measured?
Chapter 6: Culture, Norms, and Behaviors
Chapter 7: The Security Culture Diagnostic Toolkit (SCDT)
Chapter 8: Using the SCDT
Part III: Transforming Your Security Culture
Chapter 9: Culture Hacking: Fear, Uncertainty, and Doubt
Chapter 10: Inductive vs. Deductive Transformation (Top Down vs. Bottom Up)
Chapter 11: The Security Value of Failure
Chapter 12: Focus on Complexity
Chapter 13: Focus on Failure
Chapter 14: Focus on Operations
Chapter 15: Focus on Resilience
Chapter 16: Focus on Expertise
Chapter 17: Measuring Your Transformation with the CFORE Scorecard
Chapter 18: Aligning CFORE with the SCDT
Chapter 19: Okay, now what?
Appendices
Appendix A: Tools and Templates
Appendix B: Cultural Threat and Risk Modeling


Backcover

Author Information

Downloads & Resources

Downloads



Related Products

Owl Image

Date: Nov 22nd, 2016
Your Price: $50.00
Owl Image

Date: Nov 6th, 2016
Your Price: $140.00
Owl Image

Date: Nov 5th, 2016
Your Price: $60.00
Owl Image

Date: Oct 22nd, 2016
Your Price: $110.00
Owl Image

Date: Aug 26th, 2016
Your Price: $35.00
Owl Image

Date: May 22nd, 2016
Your Price: $80.00
Owl Image

Date: Apr 25th, 2016
Your Price: $85.00
Owl Image

Date: Mar 4th, 2016
Your Price: $60.00
Owl Image

Date: Dec 29th, 2015
Your Price: $99.00
Owl Image

Date: Dec 3rd, 2015
Your Price: $95.00
Owl Image

Date: Dec 3rd, 2015
Your Price: $70.00
Owl Image

Date: Oct 12th, 2015
Your Price: $60.00
Owl Image

Date: Oct 12th, 2015
Your Price: $60.00
Owl Image

Date: Sep 17th, 2015
Your Price: $50.00
Owl Image

Date: Sep 5th, 2015
Your Price: $65.00