Leadership Solutions

Physical and Logical Security Convergence

Physical and Logical Security Convergence

$59.95

Powered By Enterprise Security Management

Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic. This book begins with an overall explanation of information security, physical security, and why approaching these two different types of security in one way (called convergence) is so critical in today?s changing security landscape. It then details enterprise security management as it relates to incident detection and incident management. This is followed by detailed examples of implementation, taking the reader through cases addressing various physical security technologies such as: video surveillance, HVAC, RFID, access controls, biometrics, and more.

System and security administrators as well as operational managers for physical security and information technology departments in public and private organizations are the primary audiences for this book. Additionally, it is valuable for any individual or organization that needs the technical knowledge to converge the historically disparate professions of information technology and physical security. Finally, it is valuable to any group desiring greater operational efficiencies and a reduction in overall risk in regards to: hackers, terrorist, organized crime, nation-state threats, malicious insiders, malicious competitors, and other criminals.

Contents
1. Introduction
2. Physical Security History
3. What is Convergence and Why Do We Care?
4. Examples from the Media, Interesting Stories
5. Identity Management and & Access Control
6. Video Surveillance & Video Analysis
7. Selling Security: R.O.I. & Enterprise Deployments
8. The New Security Organization: The Trusted Enterprise
9. ESM Architecture
10. ESM Log Collection
11. ESM Event Processing, Real-Time Analysis, and Response
12. ESM Event Storage and Forensic Analysis
13. Bridging the Chinese Wall
14. Physical Controls
15. Video Surveillance - Data Center Snapshots - Video Surveillance - Tailgating
16. Environmental Controls - Dell, NetBIOS
17. Oil and Gas: SCADA
18: Final Thoughts

** Note: This resource is available at no cost or at a discount to the Council community and strategic alliance partners based upon their level of involvement. Please contact Rob West if you need assistance.


Add to Cart:

  • Model: EL001-PLSC09
  • Manufactured by: Elsevier

Please Choose:

Media Type




Copyright © 2019 The Security Executive Council.
The Security Executive Council