The Virtual Bookcase for browsing and sharing reviews of books. New to this site? Read the welcome page first.

The Virtual Bookcase Home
Recent reviews
Collected book news
Welcome to this site
Add your own book

Book details of 'Mapping Security : The Corporate Security Sourcebook for Today's Global Economy'

Cover of Mapping Security : The Corporate Security Sourcebook for Today's Global Economy
TitleMapping Security : The Corporate Security Sourcebook for Today's Global Economy
Author(s)Tom Patterson, Scott Gleeson Blue
ISBN0321304527
LanguageEnglish
PublishedDecember 2004
PublisherAddison-Wesley Professional
Web links for this book
Search at Bookcrossing.com
Wikipedia booksources
Shop for this book
At Amazon.com
At Amazon.co.uk

Back to shelf Computer security
Amazon.com info for Mapping Security : The Corporate Security Sourcebook for Today's Global Economy

Score:

Vote for this book

The Virtual Bookcase Reviews of 'Mapping Security : The Corporate Security Sourcebook for Today's Global Economy':

Reviewer Rob Slade wrote:
A sort of preface seems to indicate that this book lists countries and assigns them a security score. Chapter one repeats this same material. Part one gives general security advice. Chapter two reiterates the point that business is increasingly global in nature, and that information technology has enabled activities that can create problems for business. We shouldn't waste time with risk assessment, says chapter three. What we should do sounds an awful lot like risk assessment. (We are also told that "things are different elsewhere," as in, other countries.) Chapter four seems to start out by promoting traditional cost/benefit analysis (with regard to "return on security investment"), but quickly diverts into a list of security technologies that the author considers to be worth it (presumably regardless of your business or situation). The idea that certain security technologies can enhance business and profits is promoted in chapter five, which also lists some examples to support the concept. Chapter six appears to be advocating developing an ongoing awareness or facility for determining the existence of security threats and attacks. This idea is extended, in chapter seven, and there is also a reminder that threats, and protections, change rapidly. Part two is the list of security indices by country and region. Chapter eight reiterates the notion that things are different elsewhere, and also finally (somewhat tersely) delineates the Mapping Security Index (MSI). Europe is covered in chapter nine, first in general and then by country. Countries are not given equal space, and the assignment does seem to be on any particular basis. Much less space is devoted to the Middle East and Africa, in chapter ten. (Africa's forty-some countries are represented by South Africa, which is hardly representative. I'd rather hoped to check out Nigeria, but it isn't there.) Likewise missing are several nations from the Americas (Central America is one entity), in chapter eleven, possibly due to the space dedicated to explaining the United States (presumably to those from the United States). Chapter twelve discusses the Asia Pacific region. (Interestingly, although China gets a significant amount of space, no mention is made of the unique nature of some blackhat groups in China, the "red guests.") A conventional essay on outsourcing is presented in chapter thirteen. Part three collects some other, related, topics. Chapter fourteen is a brief introduction to this section. Laws are different elsewhere, we are informed in chapter fifteen. Distinctive uses are made of technology, in other countries, although chapter sixteen could have used more, and more effective, examples to point that out. The chapters in the book are difficult to follow, in terms of a central theme or thread. The text seems to jump from topic to topic, possibly under some commonality apparent to the author, but not explained to the reader. I'm not really clear on the audience for whom this book was supposed to be written, nor anyone to whom I could recommend it. copyright Robert M. Slade, 2005

Add my review for Mapping Security : The Corporate Security Sourcebook for Today's Global Economy

Book description:

Mapping Security Preface The 5 W s of Mapping Security Why Mapping Security I have written Mapping Security in response to questions I have fielded from corporate executives, businessmen and -women, corporate security officers, and people seated next to me on airplanes. The queries usually fall along the same lines, as follows: How much should my company be spending on security? What do these new security and privacy rules really mean to my organization? What are my peers doing about security? Now that I have gone global, what else do I have to do? (perhaps the most frequently asked question) Importantly, I wrote this book because I have found that many of the answers to questions about security are the same around the world, and critically many of the answers are different, depending on where in the world your are working. This reality linked closely to country-by-country nuances is reinforced as you read on. Even though I have now already used the word security six times the first two paragraphs alone, guess what. Mapping Security is not a run-of-the-mill, technically written volume like the vast majority of its predecessors. This book does not show you how to write a security plan or write an encryption algorithm. It is really a business book that is enabled by a business understanding of what is important in managing your corporate risk. It is written for business people around the world, and it is written with today s global economy in mind. If Not Now, When? Okay, so that s the reason why I wrote this book. When is a function of today s global economy and the risks from our increased reliance on technology. Because of supply chains, customer bases, outsourcing, and just traditional growth, more organizations than ever before are crossing borders. Therefore they are now doing business in different countries and having to change the way they look at security for the first time. Combine this global nature of business today with our great reliance on computers and communications, and we have the highest levels of threats to integral business infrastructure in history. It is time security moves to the front and center of the corporate psyche. To do that, we need a security map that spells out the realities of security, embraces all aspects of a global business, demystifies it with straight talk, and makes it accessible to entire organizations. Everyone today needs to be well armed with an understanding of the facts. Security has traditionally hidden behind esoteric discussions of cryptographic key lengths, seemingly unfathomable rules and regulations, a hacker mystique, and, often, deliberate doublespeak. Now, with technology poised to deliver the cost savings and growth needed to survive and thrive in today s global economy, it is the right time to cultivate corporate-wide understanding that leads to embracing security as the business enabler that it can be. Because companies are now working across foreign borders and must understand foreign security rules, regulations, best practices, and the local security cultures I have pulled together dozens of experts from different locales around the world, all of whom help to explain "their side" of the security equations you must deploy. Today is when we need solutions that both protect us and enable our growth. What Makes This Book Different? The what of Mapping Security is straightforward and comprises three simple parts. Part 1, "Charting a Course," will help people in any organization, anywhere in the world, reduce their risks and maximize their rewards. It outlines and illustrates six business "insider" tips for dealing with the realities of a global security plan realities such as shrinking budgets/staff; old-security thinking that holds back the use of new technologies; and the growing maze of rules, regulations, and standards that apply. It shows you how to correlate your security to appropriate rules, stretch your security budget, increase buy-in from all business units of your organization, keep an eye on what is happening in terms that make sense, and finally, incorporating constant vigilance over the evolving threats, countermeasures, technology and regulations. The chapters of Part 1 address these business tips as follows: Establishing Your Coordinates Building The Base Enabling The Businesses and Processes Developing Radar Constant Vigilance Part 2, "Reality, Illusion, and the Souk," takes a tour of more than 30 countries/regions around the world, taking an honest (sometimes painfully so) look at how security is practiced in each country. Although every organization in the world can benefit from the lessons learned from the Part 1, Part 2 offers a discussion of the important local security rules, information from local security and business experts and stories that help illustrate the sometimes difficult cultural issues that are of most significant concern for a global security rollout. Filled with quotes and anecdotes from the frontlines of local environments, and it will give you a good global understanding of the differences between various countries. Of course, its description of the local laws and regulations is designed to be heavily dog eared as a reference section to help you navigate the future, but there s another reason to turn back to it again and again the Mapping Security Index (MSI). The MSI will help you speed decision making, improve cross-border understanding, and aid in quantifying a highly qualitative process. It is my exclusive formula for making accessible the risks and benefits of moving security into a new country. I created it by combining four scores that make up some of the aspects of understanding good security: Information risks Communications connectivity Political risks Cultural diversity Based on actual historical numbers, expert rankings, and a subjective Cross-Border Index (CBI), the MSI score has been tabulated for each country. Incidentally, whereas most people who have reviewed my work believe that "their" country score is too low, they tend to think all the others are just about right. Nonetheless, and at the risk of causing passionate debates in blogs and forums around the world, I have included an MSI score for each of the countries that I covered, to help give you an instant snapshot of the local security scene. Part 3, "Whose Law Do I Break?" ties the book together by showcasing some old (sorry guys) sages from the worlds of business and security to help solve some of the conflicts that will arise when you put what you have learned from Parts 1 and 2 into global practice. Understanding what to do when laws collide, leveraging technology even on a low budget, and solving important cultural issues are explored. Part 3 helps ties it all together, with plain talk from very experienced folks who have been doing cross-border security for a long time. Following the book s three-part design is a thorough appendix, organized by country, with descriptions and pointers to the best local information that I have been able to find both in my career, and, specifically, in researching this book. I have always wanted a list like this, and now I (and you) have got one. Who Would Write a Book Like This? As for who , I have been a consumer of security services while living in the Middle East, a maker of security products, and a consultant of security services to governments and companies around the world, and I have used my understanding of security to enable three separate businesses that each transacted more than $500 million online. I have been in the trenches, run large businesses, and sat on boards of directors. I have spent the past two decades explaining security to business leaders around the word, and I recently completed a two-year tour, living and working overseas, focused exclusively on cross-border security. Living much of my adult life both working in the security world and working outside of the United States, I have developed a good appreciation for what this world has to offer and have honed strategies for overcoming its associative risks. The who also includes Scott Gleeson Blue, a talented writer and interviewer, whose tireless efforts to get the stories straight and help write them clearly are a big reason the book has turned out as it has. Scott is a Philadelphia-based author/journalist and an instructor at Neumann College (Aston, Pennsylvania). In addition to collaborating with me on security publications in the past, Scott has covered technology, consumer and popular culture, marketing, sports, and the performing arts for various publications in Europe and America. This breadth of background has lent important insight into the expert stories that we used to explain cultural differences around the world. Finally, the who would not be complete without recognizing the dozens of security and business experts who agreed to be interviewed for this book, Howard Schmidt for lending his considerable insight for the Foreword, and the Mapping Security volunteer army of researchers. As always, their wisdom and wit are greatly appreciated, and any errors are most certainly my translations, and not their thoughts. Where in the World Are We? Oh, and that leaves where . Notice that in this book s title, map is used as a verb. This book is active and organic, and it was written for businesses that work somewhere on this planet. It was written from 30 different countries, with local voices and local opinions. The Foreword was written by Howard on several airplane trips between Shanghai and Beijing, the opening letter in Part 2 was written among the ancients in Luxor, and the quotes and interviews came from each of the individual countries listed. One quote came from an expert just back from a country where he lamented that the local security folks all have their own body armor, and he had to rent! So you see, this book was written in the same where that you are now doing business: every where . So that s the who, what, where, when, and why of the book. Straightforward, demystifying (and at the same time a new and unique sourcebook for wha... From the Back Cover Praise for Tom Patterson's Mapping Security "Tom Patterson captures a compelling and practical view of security in a multinational environment. Your CSO needs to read this book!"—Dr. Vint Cerf, senior vice president of Technology Strategy at MCI and founder of Internet Protocol (IP) "The power of the Internet is that it's a global network, seamlessly crossing borders. But it also brings security risks that can cross borders just as easily. Patterson has more than a decade of first-hand experience in defending against such risks and it shows. He uses real-world examples and stories, many from his own career, and offers clear, action-oriented descriptions of the different threats and how to deal with them. This book avoids security jargon and speaks directly to businesspeople around the globe."—Chris Anderson, Editor in Chief, Wired Magazine Whether consumers or global giants, we all need to be spending a greater share of our budgets on security. The threats are greater than ever and increasing daily, and yet there is a challenge as to how to justify the expenditure. Mapping Security offers business-oriented and in-depth thinking on how and why to build security into the fabric of the organization. After reading Tom Patterson's book, you will want to make changes with a sense of urgency.—John R Patrick, president of Attitude LLC and former vice president of Internet Technology at IBM Corporation As companies of all sizes go global in their search for profit and growth, they will need to understand how to use security as a tool for success in different markets, and Mapping Security shows them how.—Dr. Craig Fields, former director of Advanced Research Projects Agency (ARPA) for the U.S. GovernmentThe Definitive Guide to Effective Security in Complex Global Markets Companies are global today and have complex security supply chains, out-sourced operations, and customer relationships that span the world. Today, more than ever, companies must protect themselves against unprecedented threats, understand and adhere to a global mosaic of regulations, and leverage security to enable today's business realities. In Mapping Security, global security expert Tom Patterson shows how to meet these challenges by presenting security best practices, rules, and customs for virtually every country where you do business. Writing for executives, business managers, security professionals, and consultants, Patterson offers an exceptionally thorough and authoritative briefing on today's global security realities. Using real-world examples, he shows how to change your approach to security as you move more deeply into global markets: how to resolve contradictions among the complex rules and customs you'll have to follow and how to customize security solutions for every market. Along the way, he introduces the Mapping Security Index (MSI), a powerful new metric for rapidly quantifying security risk associated with 30 key markets. Coverage includes * How technology, mass globalization, and stricter accountability are forcing security to the core of the enterprise * Six proven keys to defining and implementing global security strategies that work within today's budget realities * Detailed country-by-country drill downs on security in Europe, the Middle East and Africa, the Americas, and the Asia-Pacific region * Practical advice on what to do when laws collide * Quantifying the security posture and associated risks of potential cross-border partners * "On-the-ground" help: Indispensable local security resources Visit www.MappingSecurity.com for Tom Patterson's latest updates and analysis, including the latest changes to the MSI country scores, and to participate in the Mapping Security Reader Forum.© Copyright Pearson Education. All rights reserved. About the Author About the Author Tom Patterson is a business advisor in the areas of security, commerce, and governance. Patterson has been a successful international security and eCommerce partner at both KPMG and Deloitte, a strategy executive with IBM's Internet Division, and a director of security at MCC, Americas leading R&D consortium. Tom has been a board member of several public companies, has advised all three branches of the U.S. government on Internet and security policy, and is a trusted advisor to company executives around the world. Patterson regularly comments on the security issues of the day for CNBC and other major media outlets. His track record of success in large scale eCommerce, with three separate projects that have each generated over 500 million dollars online, has him in demand as an author, public speaker, board member, and business advisor. He currently resides in Pacific Palisades, California, with his wife and son. More information about the author is available at http://www.TPatterson.NET.© Copyright Pearson Education. All rights reserved. Excerpt. © Reprinted by permission. All rights reserved. Mapping SecurityPrefaceThe 5 W's of Mapping Security Why Mapping Security I have written Mapping Security in response to questions I have fielded from corporate executives, businessmen and -women, corporate security officers, and people seated next to me on airplanes. The queries usually fall along the same lines, as follows: How much should my company be spending on security? * What do these new security and privacy rules really mean to my organization? * What are my peers doing about security? Now that I have gone global, what else do I have to do? (perhaps the most frequently asked question) Importantly, I wrote this book because I have found that many of the answers to questions about security are the same around the world, and—critically—many of the answers are different, depending on where in the world your are working. This reality—linked closely to country-by-country nuances—is reinforced as you read on. Even though I have now already used the word security six times the first two paragraphs alone, guess what. Mapping Security is not a run-of-the-mill, technically written volume like the vast majority of its predecessors. This book does not show you how to write a security plan or write an encryption algorithm. It is really a business book that is enabled by a business understanding of what is important in managing your corporate risk. It is written for business people around the world, and it is written with today's global economy in mind.If Not Now, When? Okay, so that's the reason why I wrote this book. When is a function of today's global economy and the risks from our increased reliance on technology. Because of supply chains, customer bases, outsourcing, and just traditional growth, more organizations than ever before are crossing borders. Therefore they are now doing business in different countries and having to change the way they look at security for the first time. Combine this global nature of business today with our great reliance on computers and communications, and we have the highest levels of threats to integral business infrastructure in history. It is time security moves to the front and center of the corporate psyche. To do that, we need a security map that spells out the realities of security, embraces all aspects of a global business, demystifies it with straight talk, and makes it accessible to entire organizations. Everyone today needs to be well armed with an understanding of the facts. Security has traditionally hidden behind esoteric discussions of cryptographic key lengths, seemingly unfathomable rules and regulations, a hacker mystique, and, often, deliberate doublespeak. Now, with technology poised to deliver the cost savings and growth needed to survive and thrive in today's global economy, it is the right time to cultivate corporate-wide understanding that leads to embracing security as the business enabler that it can be. Because companies are now working across foreign borders—and must understand foreign security rules, regulations, best practices, and the local security cultures—I have pulled together dozens of experts from different locales around the world, all of whom help to explain "their side" of the security equations you must deploy. Today is when we need solutions that both protect us and enable our growth.What Makes This Book Different? The what of Mapping Security is straightforward and comprises three simple parts. Part 1, "Charting a Course," will help people in any organization, anywhere in the world, reduce their risks and maximize their rewards. It outlines and illustrates six business "insider" tips for dealing with the realities of a global security plan—realities such as shrinking budgets/staff; old-security thinking that holds back the use of new technologies; and the growing maze of rules, regulations, and standards that apply. It shows you how to correlate your security to appropriate rules, stretch your security budget, increase buy-in from all business units of your organization, keep an eye on what is happening in terms that make sense, and finally, incorporating constant vigilance over the evolving threats, countermeasures, technology and regulations. The chapters of Part 1 address these business tips as follows: * Establishing Your Coordinates * Building The Base * Enabling The Businesses and * Processes * Developing Radar * Constant Vigilance Part 2, "Reality, Illusion, and the Souk," takes a tour of more than 30 countries/regions around the world, taking an honest (sometimes painfully so) look at how security is practiced in each country. Although every organization in the world can benefit from the lessons learned from the Part 1, Part 2 offers a discussion of the important local security rules, information from local security and business experts and stories that help illustrate the sometimes difficult cultural issues that are of most significant concern for a global security rollout. Filled with quotes and anecdotes from the frontlines of local environments, and it will give you a good global understanding of the differences between various countries. Of course, its description of the local laws and regulations is designed to be heavily dog eared as a reference section to help you navigate the future, but there's another reason to turn back to it again and again—the Mapping Security Index (MSI). The MSI will help you speed decision making, improve cross-border understanding, and aid in quantifying a highly qualitative process. It is my exclusive formula for making accessible the risks and benefits of moving security into a new country. I created it by combining four scores that make up some of the aspects of understanding good security: * Information risks * Communications connectivity * Political risks * Cultural diversity Based on actual historical numbers, expert rankings, and a subjective Cross-Border Index (CBI), the MSI score has been tabulated for each country. Incidentally, whereas most people who have reviewed my work believe that "their" country score is too low, they tend to think all the others are just about right. Nonetheless, and at the risk of causing passionate debates in blogs and forums around the world, I have included an MSI score for each of the countries that I covered, to help give you an instant snapshot of the local security scene. Part 3, "Whose Law Do I Break?" ties the book together by showcasing some old (sorry guys) sages from the worlds of business and security to help solve some of the conflicts that will arise when you put what you have learned from Parts 1 and 2 into global practice. Understanding what to do when laws collide, leveraging technology even on a low budget, and solving important cultural issues are explored. Part 3 helps ties it all together, with plain talk from very experienced folks who have been doing cross-border security for a long time. Following the book's three-part design is a thorough appendix, organized by country, with descriptions and pointers to the best local information that I have been able to find both in my career, and, specifically, in researching this book. I have always wanted a list like this, and now I (and you) have got one. Who Would Write a Book Like This? As for who, I have been a consumer of security services while living in the Middle East, a maker of security products, and a consultant of security services to governments and companies around the world, and I have used my understanding of security to enable three separate businesses that each transacted more than $500 million online. I have been in the trenches, run large businesses, and sat on boards of directors. I have spent the past two decades explaining security to business leaders around the word, and I recently completed a two-year tour, living and working overseas, focused exclusively on cross-border security. Living much of my adult life both working in the security world and working outside of the United States, I have developed a good appreciation for what this world has to offer and have honed strategies for overcoming its associative risks. The who also includes Scott Gleeson Blue, a talented writer and interviewer, whose tireless efforts to get the stories straight and help write them clearly are a big reason the book has turned out as it has. Scott is a Philadelphia-based author/journalist and an instructor at Neumann College (Aston, Pennsylvania). In addition to collaborating with me on security publications in the past, Scott has covered technology, consumer and popular culture, marketing, sports, and the performing arts for various publications in Europe and America. This breadth of background has lent important insight into the expert stories that we used to explain cultural differences around the world. Finally, the who would not be complete without recognizing the dozens of security and business experts who agreed to be interviewed for this book, Howard Schmidt for lending his considerable insight for the Foreword, and the Mapping Security volunteer army of researchers. As always, their wisdom and wit are greatly appreciated, and any errors are most certainly my translations, and not their thoughts.Where in the World Are We? Oh, and that leaves where. Notice that in this book's title, map is used as a verb. This book is active and organic, and it was written for businesses that work somewhere on this planet. It was written from 30 different countries, with local voices and local ...

Search The Virtual Bookcase

Enter a title word, author name or ISBN.

The shelves in The Virtual Bookcase

Arts and architecture (25)
Biography (24)
Business and Management (120)
Cars and driving (53)
Cartoons (45)
Children's books (180)
Computer (475)
Computer history/fun (113)
Computer networks (382)
Computer programming (215)
Computer security (272)
Cook books (89)
Fantasy (154)
Fiction (446)
Health and body (71)
History (138)
Hobby (37)
Horror (65)
Humorous books (52)
Literature (57)
Operating systems (94)
Outdoor camping (162)
Outdoors (236)
Politics (85)
Privacy (61)
Psychology (55)
Religion (17)
Science (113)
Science Fiction (156)
Self-help books (56)
Technology (14)
Travel guides (308)
War and weapons (29)
World Wide Web (213)
Zen (5)
Other books (89)

The Virtual Bookcase is created and maintained by Koos van den Hout. Contact e-mail webmaster@virtualbookcase.com.
Site credits
Copyright © 2000-2018 Koos van den Hout / The Virtual Bookcase Copyright and privacy statement