Security Business Practices Reference

Download Security Business Practices Reference PDF Online Free

Author :
Publisher :
ISBN 13 :
Total Pages : 100 pages
Book Rating : 4.:/5 (426 download)

DOWNLOAD NOW!


Book Synopsis Security Business Practices Reference by : American Society for Industrial Security

Download or read book Security Business Practices Reference written by American Society for Industrial Security and published by . This book was released on 1998 with total page 100 pages. Available in PDF, EPUB and Kindle. Book excerpt:

Security Business Practices Reference

Download Security Business Practices Reference PDF Online Free

Author :
Publisher :
ISBN 13 : 9781887056434
Total Pages : 126 pages
Book Rating : 4.0/5 (564 download)

DOWNLOAD NOW!


Book Synopsis Security Business Practices Reference by : ASIS Council on Business Practices Staff

Download or read book Security Business Practices Reference written by ASIS Council on Business Practices Staff and published by . This book was released on 2000 with total page 126 pages. Available in PDF, EPUB and Kindle. Book excerpt:

Security Consulting

Download Security Consulting PDF Online Free

Author :
Publisher : Elsevier
ISBN 13 : 0080516866
Total Pages : 211 pages
Book Rating : 4.0/5 (85 download)

DOWNLOAD NOW!


Book Synopsis Security Consulting by : Charles A. Sennewald

Download or read book Security Consulting written by Charles A. Sennewald and published by Elsevier. This book was released on 2004-08-10 with total page 211 pages. Available in PDF, EPUB and Kindle. Book excerpt: Since 9/11, business and industry has paid close attention to security within their own organizations. In fact, no other time in modern history has business and industry been more concerned with security issues. A new concern for security measures to combat potential terrorism, sabotage, theft and disruption- which could bring any business to it's knees- has swept the nation. This has opened up a huge opportunity for private investigators and security professionals as consultants. Many retiring law enforcement and security management professionals look to enter the private security consulting market. Security consulting often involves conducting in depth security surveys so businesses will know exactly where security holes are present and where they need improvement to limit their exposure to various threats. The Third Edition of Security Consulting introduces security and law enforcement professionals to the career and business of security consulting. It provides new and potential consultants with the practical guidelines needed to start up and maintain a successful independent practice. This new edition includes updated and expanded information on marketing, fees and expenses, forensic consulting, the use of computers, and the need for professional growth. The useful sample forms will be updated in addition to the new promotion opportunities and keys to conducting research on the Web. The only book of its kind dedicated to a ground-up approach to beginning a security consulting practice Proven, practical methods to establish and run a security consulting business New coverage of utilizing the power of the Internet

Nine Practices of the Successful Security Leader

Download Nine Practices of the Successful Security Leader PDF Online Free

Author :
Publisher : Elsevier
ISBN 13 : 0124165656
Total Pages : 23 pages
Book Rating : 4.1/5 (241 download)

DOWNLOAD NOW!


Book Synopsis Nine Practices of the Successful Security Leader by : Bob Hayes

Download or read book Nine Practices of the Successful Security Leader written by Bob Hayes and published by Elsevier. This book was released on 2013-03-28 with total page 23 pages. Available in PDF, EPUB and Kindle. Book excerpt: Nine Practices of the Successful Security Leader lays out a series of best practices for security managers. Collected from interviews with security leaders at public and private sector organizations, ranging from small- and mid-size all the way up to large international entities, these practices are a sampling of what is vital and what works. Recommendations such as close communication with management, alignment of security agendas with business goals, and creating internal awareness programs are just some of the effective initiatives detailed in the report. With this information, security professionals can gain insight into the practices of their peers, measure their own success, and mentor junior colleagues. Nine Practices of the Successful Security Leader is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs. Based on extensive interviews performed by the Security Executive Council with today’s top security leaders Summarizes the insights taken from these interviews into nine practical ideas Provides actionable advice and strategies for earning the respect and trust of senior management and colleagues

Walling Out the Insiders

Download Walling Out the Insiders PDF Online Free

Author :
Publisher : CRC Press
ISBN 13 : 1315402645
Total Pages : 300 pages
Book Rating : 4.3/5 (154 download)

DOWNLOAD NOW!


Book Synopsis Walling Out the Insiders by : Michael Erbschloe

Download or read book Walling Out the Insiders written by Michael Erbschloe and published by CRC Press. This book was released on 2017-02-24 with total page 300 pages. Available in PDF, EPUB and Kindle. Book excerpt: Insider threats are everywhere. To address them in a reasonable manner that does not disrupt the entire organization or create an atmosphere of paranoia requires dedication and attention over a long-term. Organizations can become a more secure, but to stay that way it is necessary to develop an organization culture where security concerns are inherent in all aspects of organization development and management. While there is not a single one-size-fits-all security program that will suddenly make your organization more secure, this book provides security professionals and non-security managers with an approach to protecting their organizations from insider threats.

Guarding Your Business

Download Guarding Your Business PDF Online Free

Author :
Publisher : Springer Science & Business Media
ISBN 13 : 0306486385
Total Pages : 256 pages
Book Rating : 4.3/5 (64 download)

DOWNLOAD NOW!


Book Synopsis Guarding Your Business by : Manu Malek

Download or read book Guarding Your Business written by Manu Malek and published by Springer Science & Business Media. This book was released on 2005-12-30 with total page 256 pages. Available in PDF, EPUB and Kindle. Book excerpt: Guarding Your Business outlines the organizational elements that must be in place to protect the information and physical assets of typical businesses and organizations. The book recognizes the need for an architecture integrated within the organizational environment for systematic protection. Such an architecture is offered along with the building blocks to make organizations resistant to human error and resilient under physical attack or natural disaster. The book addresses risk assessment, determination of quality-of-service levels that balance safety versus cost, security versus privacy, determination of access rights to data and software, and a security-conscious culture in the organization. Questions answered by experts from academia and industry include: How can one organize for security? What organizational structures, policies, and procedures must be in place? What legal and privacy issues must be addressed?

Security Business Practices Reference

Download Security Business Practices Reference PDF Online Free

Author :
Publisher :
ISBN 13 : 9781887056458
Total Pages : 140 pages
Book Rating : 4.0/5 (564 download)

DOWNLOAD NOW!


Book Synopsis Security Business Practices Reference by :

Download or read book Security Business Practices Reference written by and published by . This book was released on 2001-06-01 with total page 140 pages. Available in PDF, EPUB and Kindle. Book excerpt:

The Security Culture Playbook

Download The Security Culture Playbook PDF Online Free

Author :
Publisher : John Wiley & Sons
ISBN 13 : 1119875242
Total Pages : 175 pages
Book Rating : 4.1/5 (198 download)

DOWNLOAD NOW!


Book Synopsis The Security Culture Playbook by : Perry Carpenter

Download or read book The Security Culture Playbook written by Perry Carpenter and published by John Wiley & Sons. This book was released on 2022-03-08 with total page 175 pages. Available in PDF, EPUB and Kindle. Book excerpt: Mitigate human risk and bake security into your organization’s culture from top to bottom with insights from leading experts in security awareness, behavior, and culture. The topic of security culture is mysterious and confusing to most leaders. But it doesn’t have to be. In The Security Culture Playbook, Perry Carpenter and Kai Roer, two veteran cybersecurity strategists deliver experience-driven, actionable insights into how to transform your organization’s security culture and reduce human risk at every level. This book exposes the gaps between how organizations have traditionally approached human risk and it provides security and business executives with the necessary information and tools needed to understand, measure, and improve facets of security culture across the organization. The book offers: An expose of what security culture really is and how it can be measured A careful exploration of the 7 dimensions that comprise security culture Practical tools for managing your security culture program, such as the Security Culture Framework and the Security Culture Maturity Model Insights into building support within the executive team and Board of Directors for your culture management program Also including several revealing interviews from security culture thought leaders in a variety of industries, The Security Culture Playbook is an essential resource for cybersecurity professionals, risk and compliance managers, executives, board members, and other business leaders seeking to proactively manage and reduce risk.

A Practical Guide to Security Assessments

Download A Practical Guide to Security Assessments PDF Online Free

Author :
Publisher : CRC Press
ISBN 13 : 1135500312
Total Pages : 516 pages
Book Rating : 4.1/5 (355 download)

DOWNLOAD NOW!


Book Synopsis A Practical Guide to Security Assessments by : Sudhanshu Kairab

Download or read book A Practical Guide to Security Assessments written by Sudhanshu Kairab and published by CRC Press. This book was released on 2004-09-29 with total page 516 pages. Available in PDF, EPUB and Kindle. Book excerpt: The modern dependence upon information technology and the corresponding information security regulations and requirements force companies to evaluate the security of their core business processes, mission critical data, and supporting IT environment. Combine this with a slowdown in IT spending resulting in justifications of every purchase, and security professionals are forced to scramble to find comprehensive and effective ways to assess their environment in order to discover and prioritize vulnerabilities, and to develop cost-effective solutions that show benefit to the business. A Practical Guide to Security Assessments is a process-focused approach that presents a structured methodology for conducting assessments. The key element of the methodology is an understanding of business goals and processes, and how security measures are aligned with business risks. The guide also emphasizes that resulting security recommendations should be cost-effective and commensurate with the security risk. The methodology described serves as a foundation for building and maintaining an information security program. In addition to the methodology, the book includes an Appendix that contains questionnaires that can be modified and used to conduct security assessments. This guide is for security professionals who can immediately apply the methodology on the job, and also benefits management who can use the methodology to better understand information security and identify areas for improvement.

Security Operations Management

Download Security Operations Management PDF Online Free

Author :
Publisher : Butterworth-Heinemann
ISBN 13 : 0128026189
Total Pages : 466 pages
Book Rating : 4.1/5 (28 download)

DOWNLOAD NOW!


Book Synopsis Security Operations Management by : Robert McCrie

Download or read book Security Operations Management written by Robert McCrie and published by Butterworth-Heinemann. This book was released on 2015-09-11 with total page 466 pages. Available in PDF, EPUB and Kindle. Book excerpt: Security Operations Management, 3rd edition, is the latest edition the seminal reference on corporate security management operations for today’s security management professionals and students. The book explores the characteristics of today’s globalized workplaces, why security has a key role within them, and what the greatest concern are to security practitioners and senior managers. Incorporating the latest security research and best practices, updates to Security Operations Management 3rd edition include explorations of the key skills needed by security managers to demonstrate the value of their security program, greater emphasis on identifying and managing risk, and coverage of the latest technological advances in security control, command, communications, and computing. The third edition also delves more deeply than previous editions into online security training practices, as well as investigates the changing roles of women and minorities in security operations. Includes all-new cases and examples—including from outside the U.S.—providing coverage of both the business and technical aspects of security Offers increased coverage of cybercrime and workplace violence Explores the latest technological advances in security control, command, communications, and computing, and current techniques for how prospective security personnel are vetted, including how to use social media Prepares security professionals for professional certification exams

Building Security Partner Programs

Download Building Security Partner Programs PDF Online Free

Author :
Publisher :
ISBN 13 :
Total Pages : 0 pages
Book Rating : 4.2/5 (182 download)

DOWNLOAD NOW!


Book Synopsis Building Security Partner Programs by : Jeremiah Talamantes

Download or read book Building Security Partner Programs written by Jeremiah Talamantes and published by . This book was released on 2023-05-31 with total page 0 pages. Available in PDF, EPUB and Kindle. Book excerpt: "Building Security Partner Programs: Driving Cybersecurity Success Through Strategic Partnerships" by Jeremiah Talamantes is a transformative book addressing the challenges of information security in today's fast-paced technology landscape. This comprehensive guide offers a blueprint for organizations seeking to revolutionize their cybersecurity approach by embedding security professionals within product and engineering teams through innovative Security Partner Programs.The book starts by examining the shortcomings of traditional information security approaches, where security is often an afterthought, resulting in delayed product launches, costly remediation, insecure products, and loss of trust. In response, the author introduces "Continuous Integrated Security," a set of principles designed to infuse security throughout the product and development lifecycle, akin to the Agile Manifesto but customized for security."Building Security Partner Programs" provides a step-by-step guide to architecting, implementing, and managing a successful Security Partner Program within your organization. The book delves into practical aspects of creating a program framework that promotes collaboration, communication, and continuous improvement, integrating it seamlessly into your organization's existing structure.By embedding security partners within product and engineering teams, the book demonstrates how organizations can bridge the gap between security and development, enabling faster product delivery and innovation while ensuring robust security. Additionally, the author offers insights into overcoming common obstacles, building stakeholder buy-in, and cultivating a security-aware culture.Measuring the effectiveness of a Security Partner Program is crucial, and this book equips you with tools and techniques to establish key performance indicators (KPIs), monitor progress, and evaluate the program's impact. Moreover, the book guides you in future-proofing your Security Partner Program by adapting to organizational growth, integrating emerging technologies, and fostering a community of security professionals.Authored by industry expert Jeremiah Talamantes, "Building Security Partner Programs" is a must-read for business leaders, security professionals, and IT managers seeking a proactive approach to cybersecurity. With its practical examples and actionable steps, this book empowers you to transform your organization's security practices and build a sustainable, agile security culture that keeps pace with the rapidly evolving technology landscape.

Building a Corporate Culture of Security

Download Building a Corporate Culture of Security PDF Online Free

Author :
Publisher : Butterworth-Heinemann
ISBN 13 : 012802058X
Total Pages : 300 pages
Book Rating : 4.1/5 (28 download)

DOWNLOAD NOW!


Book Synopsis Building a Corporate Culture of Security by : John Sullivant

Download or read book Building a Corporate Culture of Security written by John Sullivant and published by Butterworth-Heinemann. This book was released on 2016-02-24 with total page 300 pages. Available in PDF, EPUB and Kindle. Book excerpt: Building a Corporate Culture of Security: Strategies for Strengthening Organizational Resiliency provides readers with the proven strategies, methods, and techniques they need to present ideas and a sound business case for improving or enhancing security resilience to senior management. Presented from the viewpoint of a leading expert in the field, the book offers proven and integrated strategies that convert threats, hazards, risks, and vulnerabilities into actionable security solutions, thus enhancing organizational resiliency in ways that executive management will accept. The book delivers a much-needed look into why some corporate security practices programs work and others don’t. Offering the tools necessary for anyone in the organization charged with security operations, Building a Corporate Culture of Security provides practical and useful guidance on handling security issues corporate executives hesitate to address until it’s too late. Provides a comprehensive understanding of the root causes of the most common security vulnerabilities that impact organizations and strategies for their early detection and prevention Offers techniques for security managers on how to establish and maintain effective communications with executives, especially when bringing security weakness--and solutions--to them Outlines a strategy for determining the value and contribution of protocols to the organization, how to detect gaps, duplications and omissions from those protocols, and how to improve their purpose and usefulness Explores strategies for building professional competencies; managing security operations, and assessing risks, threats, vulnerabilities, and consequences Shows how to establish a solid foundation for the layering of security and building a resilient protection-in-depth capability that benefits the entire organization Offers appendices with proven risk management and risk-based metric frameworks and architecture platforms

Security Leader Insights for Success

Download Security Leader Insights for Success PDF Online Free

Author :
Publisher : Elsevier
ISBN 13 : 012800908X
Total Pages : 141 pages
Book Rating : 4.1/5 (28 download)

DOWNLOAD NOW!


Book Synopsis Security Leader Insights for Success by : Dave Komendat

Download or read book Security Leader Insights for Success written by Dave Komendat and published by Elsevier. This book was released on 2014-03-06 with total page 141 pages. Available in PDF, EPUB and Kindle. Book excerpt: How do you, as a busy security executive or manager, stay current with evolving issues, familiarize yourself with the successful practices of your peers, and transfer this information to build a knowledgeable, skilled workforce the times now demand? With Security Leader Insights for Success, a collection of timeless leadership best practices featuring insights from some of the nation’s most successful security practitioners, you can. This book can be used as a quick and effective resource to bring your security staff up to speed on leadership issues. Instead of re-inventing the wheel when faced with a new challenge, these proven practices and principles will allow you to execute with confidence knowing that your peers have done so with success. Security Leader Insights for Success is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs. Each chapter can be read in five minutes or less, and is written by or contains insights from experienced security leaders. Can be used to find illustrations and examples you can use to deal with a relevant issue. Brings together the diverse experiences of proven security leaders in one easy-to-read resource.

Information security training for employees

Download Information security training for employees PDF Online Free

Author :
Publisher : Cybellium Ltd
ISBN 13 :
Total Pages : 297 pages
Book Rating : 4.8/5 (565 download)

DOWNLOAD NOW!


Book Synopsis Information security training for employees by : Cybellium Ltd

Download or read book Information security training for employees written by Cybellium Ltd and published by Cybellium Ltd. This book was released on 2023-09-05 with total page 297 pages. Available in PDF, EPUB and Kindle. Book excerpt: In today's data-driven world, the safeguarding of sensitive information is of paramount importance. As organizations increasingly rely on digital platforms to operate, the risk of data breaches and security lapses has never been greater. "Information Security Training for Employees" is an essential guide that equips both employers and staff with the knowledge and skills needed to navigate the complex landscape of information security effectively. About the Book: This comprehensive guide, authored by experts in the field, provides a practical and accessible resource for organizations seeking to enhance their defenses against information security threats. Geared towards CEOs, managers, HR professionals, IT teams, and all employees, this book addresses the critical role each individual plays in upholding information security. Key Features: · Understanding Information Security: Delve into the various dimensions of information security, ranging from data privacy and encryption to access controls and compliance. Gain a clear grasp of the principles that underpin effective information security measures. · Creating a Security-Conscious Culture: Discover strategies for fostering a culture of information security awareness within your organization. Learn how to engage employees at all levels and instill best practices that will empower them to become vigilant defenders of sensitive data. · Practical Training Modules: The book presents a series of pragmatic training modules covering essential topics such as password management, email security, data classification, secure communication, and more. Each module features real-world scenarios, interactive exercises, and actionable tips that can be seamlessly integrated into any organization's training framework. · Real-Life Case Studies: Explore real-world case studies that underscore the consequences of lax information security practices. Analyze the lessons derived from notable breaches and understand how implementing robust security measures could have averted or minimized the impact of these incidents. · Adapting to Evolving Threats: With the ever-changing landscape of information security threats, the book emphasizes the importance of adaptability. Learn how to identify emerging threats, stay updated on the latest security practices, and adjust your organization's strategy accordingly. · Empowering Remote Work Security: As remote work becomes increasingly prevalent, the book addresses the unique security challenges posed by remote work arrangements. Discover strategies for securing remote access, protecting sensitive data in transit, and maintaining secure remote communication channels. · Continuous Improvement: Information security is an ongoing endeavor. The book underscores the necessity of continuous assessment, refinement, and improvement of your organization's information security posture. Learn how to conduct security audits, identify areas for enhancement, and implement proactive measures. · Resources and Tools: Access a range of supplementary resources, including downloadable templates, checklists, and references to reputable security tools. These resources will aid in kickstarting your organization's information security training initiatives and fostering lasting improvements.

Worshipful Company of Security Professionals

Download Worshipful Company of Security Professionals PDF Online Free

Author :
Publisher : Createspace Independent Publishing Platform
ISBN 13 : 9781719541077
Total Pages : 144 pages
Book Rating : 4.5/5 (41 download)

DOWNLOAD NOW!


Book Synopsis Worshipful Company of Security Professionals by : Gerard Blokdyk

Download or read book Worshipful Company of Security Professionals written by Gerard Blokdyk and published by Createspace Independent Publishing Platform. This book was released on 2018-05-25 with total page 144 pages. Available in PDF, EPUB and Kindle. Book excerpt: Who will be responsible for making the decisions to include or exclude requested changes once Worshipful Company of Security Professionals is underway? Is there a Worshipful Company of Security Professionals management charter, including business case, problem and goal statements, scope, milestones, roles and responsibilities, communication plan? Has the Worshipful Company of Security Professionals work been fairly and/or equitably divided and delegated among team members who are qualified and capable to perform the work? Has everyone contributed? What are the Essentials of Internal Worshipful Company of Security Professionals Management? How can the value of Worshipful Company of Security Professionals be defined? Defining, designing, creating, and implementing a process to solve a challenge or meet an objective is the most valuable role... In EVERY group, company, organization and department. Unless you are talking a one-time, single-use project, there should be a process. Whether that process is managed and implemented by humans, AI, or a combination of the two, it needs to be designed by someone with a complex enough perspective to ask the right questions. Someone capable of asking the right questions and step back and say, 'What are we really trying to accomplish here? And is there a different way to look at it?' This Self-Assessment empowers people to do just that - whether their title is entrepreneur, manager, consultant, (Vice-)President, CxO etc... - they are the people who rule the future. They are the person who asks the right questions to make Worshipful Company of Security Professionals investments work better. This Worshipful Company of Security Professionals All-Inclusive Self-Assessment enables You to be that person. All the tools you need to an in-depth Worshipful Company of Security Professionals Self-Assessment. Featuring new and updated case-based questions, organized into seven core areas of process design, this Self-Assessment will help you identify areas in which Worshipful Company of Security Professionals improvements can be made. In using the questions you will be better able to: - diagnose Worshipful Company of Security Professionals projects, initiatives, organizations, businesses and processes using accepted diagnostic standards and practices - implement evidence-based best practice strategies aligned with overall goals - integrate recent advances in Worshipful Company of Security Professionals and process design strategies into practice according to best practice guidelines Using a Self-Assessment tool known as the Worshipful Company of Security Professionals Scorecard, you will develop a clear picture of which Worshipful Company of Security Professionals areas need attention. Your purchase includes access details to the Worshipful Company of Security Professionals self-assessment dashboard download which gives you your dynamically prioritized projects-ready tool and shows your organization exactly what to do next. Your exclusive instant access details can be found in your book.

Security Management

Download Security Management PDF Online Free

Author :
Publisher : CRC Press
ISBN 13 : 1466561777
Total Pages : 204 pages
Book Rating : 4.4/5 (665 download)

DOWNLOAD NOW!


Book Synopsis Security Management by : Michael Land

Download or read book Security Management written by Michael Land and published by CRC Press. This book was released on 2013-12-04 with total page 204 pages. Available in PDF, EPUB and Kindle. Book excerpt: Security is a paradox. It is often viewed as intrusive, unwanted, a hassle, or something that limits personal, if not professional, freedoms. However, if we need security, we often feel as if we can never have enough. Security Management: A Critical Thinking Approach provides security professionals with the ability to critically examine their organizational environment and make it secure while creating an optimal relationship between obtrusion and necessity. It stresses the benefits of using a methodical critical thinking process in building a comprehensive safety management system. The book provides a mechanism that enables readers to think clearly and critically about the process of security management, emphasizing the ability to articulate the differing aspects of business and security management by reasoning through complex problems in the changing organizational landscape. The authors elucidate the core security management competencies of planning, organizing, staffing, and leading while providing a process to critically analyze those functions. They specifically address information security, cyber security, energy-sector security, chemical security, and general security management utilizing a critical thinking framework. Going farther than other books available regarding security management, this volume not only provides fundamental concepts in security, but it also creates informed, critical, and creative security managers who communicate effectively in their environment. It helps create a practitioner who will completely examine the environment and make informed well-thought-out judgments to tailor a security program to fit a specific organization.

How to be Your Company's Security Director

Download How to be Your Company's Security Director PDF Online Free

Author :
Publisher : Charles C. Thomas Publisher
ISBN 13 : 9780398069377
Total Pages : 0 pages
Book Rating : 4.0/5 (693 download)

DOWNLOAD NOW!


Book Synopsis How to be Your Company's Security Director by : Keith Smith Shannon

Download or read book How to be Your Company's Security Director written by Keith Smith Shannon and published by Charles C. Thomas Publisher. This book was released on 1999 with total page 0 pages. Available in PDF, EPUB and Kindle. Book excerpt: The intent of this book is to give a working business professional a realistic review of security issues that a business may have to deal with on an everyday basis. Many texts have been written discussing these issues in great detail offering solutions. While the value of these presentations is very worthwhile for the security professional, most management professionals need a more simple and workable way to deal with security problems. This presentation endeavors to outline security remedies and options on a level most useful for the average business professional. In many businesses, security management is assigned to administrative personnel not familiar with protection topics. This book will give those individuals a working knowledge of security issues and practices. It can be used as an informed starting point with which to deal with a security situation completely, or at best, give some general know ledge of the field if security professionals have to be called. This basic information can save a company money, and the person assigned the task can feel some level of comfort in dealing with the topic. The author emphasizes that the best methods for dealing with security problems are the simplest. Management desires a list of options from the security professional and then the best course of action has to be factored into the business life of the firm. The author shows how the best absolute security remedy will often not be the best overall action for the company, and that a combination of steps may have to be taken in order to address the problem.