Skip to main content
main-content

Über dieses Buch

This book shows you how military counter-intelligence principles and objectives are applied. It provides you with valuable advice and guidance to help your business understand threat vectors and the measures needed to reduce the risks and impacts to your organization. You will know how business-critical assets are compromised: cyberattack, data breach, system outage, pandemic, natural disaster, and many more.

Rather than being compliance-concentric, this book focuses on how your business can identify the assets that are most valuable to your organization and the threat vectors associated with these assets. You will learn how to apply appropriate mitigation controls to reduce the risks within suitable tolerances.

You will gain a comprehensive understanding of the value that effective protective security provides and how to develop an effective strategy for your type of business.

What You Will Learn

Take a deep dive into legal and regulatory perspectives and how an effective protective security strategy can help fulfill these ever-changing requirementsKnow where compliance fits into a company-wide protective security strategySecure your digital footprintBuild effective 5 D network architectures: Defend, detect, delay, disrupt, deterSecure manufacturing environments to balance a minimal impact on productivitySecuring your supply chains and the measures needed to ensure that risks are minimized

Who This Book Is For

Business owners, C-suite, information security practitioners, CISOs, cybersecurity practitioners, risk managers, IT operations managers, IT auditors, and military enthusiasts

Inhaltsverzeichnis

Frontmatter

Chapter 1. Introduction

Abstract
No doubt, many of you will agree that 2020 has been incredibly challenging for many organizations across the globe. Having to respond to the pandemic, many businesses needed to change their ways of working to ensure minimal disruption to their operations.
Jim Seaman

Chapter 2. What Is Protective Security (PS)?

Abstract
It may seem strange to be referencing a famous quote, regarding courage, when introducing the topic of Protective Security. However, courage comes in two types – physical and moral.
Jim Seaman

Chapter 3. Protective Security (PS) in terms of the Legal and Regulatory Considerations for the Digital Business

Abstract
Until recently, businesses have been pretty much lawless and without any regulation.
Jim Seaman

Chapter 4. The Integration of Compliance with Protective Security (PS)

Abstract
US Army General
Jim Seaman

Chapter 5. Developing a Protective Security Strategy

Abstract
The origins of “strategy” can be traced by to 1810, meaning the “art of a General” and causally linked with the Greek strategia "office or command of a general," from strategos "general, commander of an army," and from the title of various civil officials and magistrates, from stratos "multitude, army, expedition, encamped army." This first became a nonmilitary used term from 1887.
Jim Seaman

Chapter 6. Cyber Security and the Digital Business

Abstract
Writing on his Command of 92 Squadron, WWII
Jim Seaman

Chapter 7. Network/IT Security in Protective Security (PS)

Abstract
The German occupation of Crete in May 1941, after a rain of destruction from the air, provoked British Prime Minister Sir Winston Churchill to shoot a hotly worded memo to his secretary of state for air and to the chief of the air staff.
Jim Seaman

Chapter 8. Information Systems Security

Abstract
You may well wonder why I have quoted Napoleon when introducing the subject of “Information Systems Security.” Napoleon was a well-renowned tactician and leader, but at the heart of his success was the reliance on his “Information System” (aka his brain) to allow him to carry out successful analysis and calculations.
Jim Seaman

Chapter 9. Physical Security

Abstract
There is often a misconception within the industry as to what constitutes an effective Physical Security strategy, and individuals may perceive effective Physical Security as being likened to that of a prison (with the high thick walls marking the perimeter). However, as you can see from Sun Tzu’s 512 BC quote, the opposite provides effective Physical Security defensive measures.
Jim Seaman

Chapter 10. Industrial Systems Protective Security

Abstract
In Joseph Stalin’s address to the Voters of the Stalin Electoral District meeting, he acknowledged the importance being equipped with the most up-to-date armaments played in their success during World War 2.
Jim Seaman

Chapter 11. Securing Your Supply Chain

Abstract
The Defence Manual of Security (Joint Services Publication 440 (JSP 440)) defined an asset as being
Jim Seaman

Chapter 12. Developing Your Human Firewall

Abstract
Increasingly, we see the insider threat as being the greatest cause of security incidents and data loss. From a benchmarked sample, across 13 industries (as depicted in Figure 12-2), the average cost of the insider threat was identified at $11.45 million (astonishingly, this equates to a 47% increase in the last 2 years).
Jim Seaman

Chapter 13. Strict Access Restrictions

Abstract
Captain Liddell Hart’s words have never been truer than when looking to create strict access restrictions for a business’ digital solutions. Every time a login screen is made available to the wider audience, it is like sending troops into war, with the Internet representing the battle fields.
Jim Seaman

Chapter 14. Building Resilience

Abstract
The Human in Command (as depicted in Figure 14-1)
Jim Seaman

Chapter 15. Demonstrating the Protective Security Return on Investment (ROI)

Abstract
As someone who has both benefited from and have invested in ventures that enhance morale, I can concur as to the benefits which, on the face of it, may appear to provide a limited ROI (you can see a chronology of my training in Appendix A).
Jim Seaman

Backmatter

Weitere Informationen

Premium Partner

    Bildnachweise