People-centric security transforming your enterprise security culture

A culture hacking how to complete with strategies, techniques, and resources for securing the most volatile element of information security--humans People-Centric Security: Transforming Your Enterprise Security Culture addresses the urgent need for change at the intersection of people and security....

Full description

Bibliographic Details
Main Author: Hayden, Lance
Format: eBook
Language:English
Published: New York McGraw-Hill Education 2016
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 04164nmm a2200517 u 4500
001 EB001938549
003 EBX01000000000000001101451
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 9780071846790 
050 4 |a HD30.2 
100 1 |a Hayden, Lance 
245 0 0 |a People-centric security  |b transforming your enterprise security culture  |c Lance Hayden 
260 |a New York  |b McGraw-Hill Education  |c 2016 
300 |a 1 volume  |b illustrations 
505 0 |a Includes bibliographical references and index 
505 0 |a Machine generated contents note: Part I: Understanding Your Security Culture -- Chapter 1: Information Security: Adventures in Culture Hacking -- Chapter 2: Strategy for Breakfast: The Hidden Power of Security Culture -- Chapter 3: Organizational Culture: A Primer -- Chapter 4: People-Centric Security -- Part II: Measuring Your Security Culture -- Chapter 5: The Competing Security Cultures Framework -- Chapter 6: The Security Culture Diagnostic Toolkit (SCDT) -- Chapter 7: Creating Culture Maps with the Security Culture Diagnostic Toolkit -- Chapter 8: Using the SCDT -- Part III: Transforming Your Security Culture -- Chapter 9: From Diagnosis to Transformation: Implementing People-Centric Security -- Chapter 10: Security FORCE -- A Behavioral Model for People-Centric Security -- Chapter 11: The Security Value of Failure -- Chapter 12: The Security Value of Operations -- Chapter 13: The Security Value of Resilience -- Chapter 14: The Security Value of Complexity -- Chapter 15: The Security Value of Expertise -- Chapter 16: Behavior and Culture: Mastering People-Centric Security -- Chapter 17: Leadership, Power and Influence in People-Centric Security -- Chapter 18: A People-Centric Future 
653 |a Sociétés / Sécurité / Mesures 
653 |a Computer security 
653 |a Corporate culture / http://id.loc.gov/authorities/subjects/sh85032896 
653 |a Sécurité informatique 
653 |a Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277 
653 |a Corporations / Security measures / fast 
653 |a Computer networks / Security measures / fast 
653 |a Culture organisationnelle 
653 |a Réseaux d'ordinateurs / Sécurité / Mesures 
653 |a Organizational Culture 
653 |a Corporate culture / fast 
653 |a Computer crimes / Prevention 
653 |a Corporations / Security measures 
653 |a Computer security / fast 
653 |a Computer crimes / Prevention / fast 
653 |a Computer Security 
653 |a COMPUTERS / Security / General / bisacsh 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
776 |z 9780071846776 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780071846790/?ar  |x Verlag  |3 Volltext 
082 0 |a 331 
082 0 |a 302.35 
082 0 |a 364.1 
082 0 |a 300 
082 0 |a 338 
082 0 |a 658.4/7 
520 |a A culture hacking how to complete with strategies, techniques, and resources for securing the most volatile element of information security--humans People-Centric Security: Transforming Your Enterprise Security Culture addresses the urgent need for change at the intersection of people and security. Esentially a complete security culture toolkit, this comprehensive resource provides you with a blueprint for assessing, designing, building, and maintaining human firewalls. Globally recognized information security expert Lance Hayden lays out a course of action for drastically improving organizations' security cultures through the precise use of mapping, survey, and analysis. You'll discover applied techniques for embedding strong security practices into the daily routines of IT users and learn how to implement a practical, executable, and measurable program for human security. Features downloadable mapping and surveying templates Case studies throughout showcase the methods explained in the book Valuable appendices detail security tools and cultural threat and risk modeling Written by an experienced author and former CIA human intelligence officer