Visible Ops Security builds upon the methodology presented in the original Visible Ops Handbook. It guides information security professionals in strengthening relationships with IT operations and development groups to advance IT objectives and business goals. It addresses the people side of IT, empowering security to work with operations teams to achieve closely aligned ob Visible Ops Security builds upon the methodology presented in the original Visible Ops Handbook. It guides information security professionals in strengthening relationships with IT operations and development groups to advance IT objectives and business goals. It addresses the people side of IT, empowering security to work with operations teams to achieve closely aligned objectives and with development and release teams to integrate security requirements into preproduction work. The Visible Ops Security methodology helps IT organizations move beyond a focus on technology to address the core operational aspects of security. It complements publications that focus on securing the network, access, and data, including COBIT (Control Objectives for Information and related Technology), ISO 27001:2005 (International Standards Organization), and ITIL® (IT Infrastructure Library) manuals. It promotes effective teamwork, which helps security professionals ensure that security is built into key development and production processes. This effort positions the IT organization to meet business needs by delivering highly available, cost-effective, and secure services.
Visible Ops Security: Achieving Common Security and IT Operations Objectives in 4 Practical Steps
Visible Ops Security builds upon the methodology presented in the original Visible Ops Handbook. It guides information security professionals in strengthening relationships with IT operations and development groups to advance IT objectives and business goals. It addresses the people side of IT, empowering security to work with operations teams to achieve closely aligned ob Visible Ops Security builds upon the methodology presented in the original Visible Ops Handbook. It guides information security professionals in strengthening relationships with IT operations and development groups to advance IT objectives and business goals. It addresses the people side of IT, empowering security to work with operations teams to achieve closely aligned objectives and with development and release teams to integrate security requirements into preproduction work. The Visible Ops Security methodology helps IT organizations move beyond a focus on technology to address the core operational aspects of security. It complements publications that focus on securing the network, access, and data, including COBIT (Control Objectives for Information and related Technology), ISO 27001:2005 (International Standards Organization), and ITIL® (IT Infrastructure Library) manuals. It promotes effective teamwork, which helps security professionals ensure that security is built into key development and production processes. This effort positions the IT organization to meet business needs by delivering highly available, cost-effective, and secure services.
Compare
Eric Kolb –
Dry as a bone, but a good signpost for thinking about where you should go from here in the field of information security. Phase 2 gets a bit abstract, dealing with risk in a more nebulous way than I think most folks would prefer. Nevertheless, there's a lot of good practical advice in here; this is definitely something I'll share with some of my team members who are really driven to help mature the IT and security organization. Dry as a bone, but a good signpost for thinking about where you should go from here in the field of information security. Phase 2 gets a bit abstract, dealing with risk in a more nebulous way than I think most folks would prefer. Nevertheless, there's a lot of good practical advice in here; this is definitely something I'll share with some of my team members who are really driven to help mature the IT and security organization.
Jeff –
I thought that this was an okay read, but about 60% of the content was a rote rehash of the much more generally applicable The Visible Ops Handbook. With this book smaller than a lot of coffee table books, that doesn't leave a whole lot of content for the money. Worth borrowing, not worth buying. I thought that this was an okay read, but about 60% of the content was a rote rehash of the much more generally applicable The Visible Ops Handbook. With this book smaller than a lot of coffee table books, that doesn't leave a whole lot of content for the money. Worth borrowing, not worth buying.
Shaun Mouton –
Like the other Visible Ops books, its strength lies in the distillation of complex information to a set of essentials well suited to a management audience. These books can be used to guide processes towards functional implementations of ITIL and a healthier service orientation.
Jeremy –
Not a pleasure read, but a good read for IT or Information Security professionals.
John Kinsella –
Scott Anderson –
Simonas Būda –
Dick McNeil –
Pyang –
Sean Lamm –
John Hoffoss –
Simon –
Brook Ferguson –
Paul Horbal –
Ariel Companioni –
jaybee_reads –
Mark Shurtleff –
Rick Patterson –
Thomas R. Sinnott –
Nigel Harris –
Paul Vilevac –
Shannon –
Matt –
Charles T Fox –
Izidor –
Kris Arthur –
Paul Turcotte –
Mark Potter –
Kim Halavakoski –
Chris –