Cookies must be enabled to use this web application.

To allow this site to use cookies, use the steps that apply to your browser below. If your browser is not listed below, or if you have any questions regarding this site, please contact us.

Microsoft Internet Explorer
  • 1. Select "Internet Options" from the Tools menu.
  • 2. Click on the "Privacy" tab.
  • 3. Click the "Default" button.
  • 4. Click "OK" to save changes.
Chrome Chrome
  • 1. Click the "Spanner" icon in the top right of the browser.
  • 2. Click Options and change to the "Under the Hood" tab.
  • 3. Scroll down until you see "Cookie settings:".
  • 4. Set this to "Allow all cookies".
Firefox Firefox
  • 1. Go to the "Tools" menu and select "Options".
  • 2. Click the "Privacy" icon on the top of the window.
  • 3. Click on the "Cookies" tab.
  • 4. Check the box corresponding to "Allow sites to set Cookies.
  • 5. Click "OK" to save changes.
Opera Opera
  • 1. Click on the "Tools" menu and then click Preferences.
  • 2. Change to the Advanced tab, and to the cookie section.
  • 3. Select "Accept cookies only from the site I visit" or "Accept cookies".
  • 4. Ensure "Delete new cookies when exiting Opera" is not ticked.
  • 5. Click OK.
Netscape and Mozilla Suite Netscape and Mozilla Suite
  • 1. Select "Preferences" from the Edit menu.
  • 2. Click on the arrow next to "Privacy & Security".
  • 3. Under "Privacy & Security" select "Cookies".
  • 4. Select "Enable all cookies".
  • 5. Click "OK" to save changes.
Safari Safari
  • 1. Click on the "Cog" icon in Safari.
  • 2. Click Preferences.
  • 3. Change to the Security tab.
  • 4. Select "Only from sites I visit" or "Allow".
  • 5. Close the dialog using the cross.
Book Image Not Available Book Image Not Available
Book details
  • Genre:COMPUTERS
  • SubGenre:Security / General
  • Language:English
  • Series title:Combat Ready Series
  • Series Number:1
  • Pages:580
  • Format:Paperback
  • eBook ISBN:9781682220306
  • Paperback ISBN:9781682220290

Combat Ready IT and PIE

Cyber Security for Small Medium Business and Perpetual Improvement Everywhe

by P.B. Dove

Book Image Not Available Book Image Not Available
Overview

Organising DevOPs to save SMBs money.  This book shows how to organise for a better level of cybersecurity. 

The book is aimed at Pioneers, Start Ups, and SMBs who wish to develop their Cyber Security culture. It was written so even my 83 year old mother can understand Cyber Security. Root causes such as the raging insecurity of the Internet, Vendors and Subscribers themselves contribute to adversaries and hackers stealing Intellectual Property. Solutions to these problems are provided and how new IT infrastructures, Reorganizing Agile and DevOps Teams, and implementing Hybrid Clouds can help reduce a companies security exposure and make money. It takes the best of ITIL COBIT and Risk practices and puts this within understandable reach of the new Technology Value Centre. The culmination of the book seeks to help SMBs without any security in place to meet or exceed current regulations and avoid fines.

AVAILABLE ON IBOOKS
Description

Like the Industrial Revolution and the Information Technology Age, this year we started a new Wave headlined as the Golden Wave of the SMB - (the age of the Artisan). Enterprises have already commenced reducing their workforces but are left stranded by legacy infrastructure.

This book lays out a MetroMap for the Roles and Responsibilities for a PIE organization linking DevOps, SecOps, Disciplined Agilists, Alchemists, Resolvers and Audiologists into a OmniOcular Self Determined organization. Deploying new cost effective tools and infrastructure saves money. Craft flows will be handed off out to artisans, specialists, and in particular SMBs. The book introduces Via Ferrata Risk Management and SHAZOPS for Secure IT development.

Robotica and automation technology join and the accepted notion of the FTE will disappear. Outsourcing will become Broadsourcing. The way we work today will start to change, no job will be safe or long term. Millennial’s may never work in the way we perceive work now. The age of the four-man company is here: the Boss, the IT guy, the Specialist, and the Robot. Leisure time will increase and a return to cottage industry and artisans will rise. De-urbanisation will be ignited by the Rich/Poor divide gap widens where only the wealthy can afford city housing and prices. Everyone will rely on the Internet. The Internet cannot cope with this in its current design. Cyber security may degrade the Internet so badly to be unworkable.

This book sets out a new way for SMBs to prepare for the change and start Innovating. Cyber Security is the linking of technologies, risk management, people and business continuity practices that protect networks, computers, programmes and information from perpetual unauthorised attacks, damage or access. Information Security is the term associated with managing and control of the SMBs’ information assets (Intellectual Property, Financial, and Customer Data). We are in a cyber security war! An SMB needs to be fleet of foot, to be fast you need to travel light, to ease the burden you need automation, if you need automation you need the right tools, to get the right tools you need people to deliver them, if you can’t afford the tools use the free ones, and if you can't find the people, buy them in. Reliance on IT will be the key to survival so shore up your security posture. Words, Processes, Regulations, and Frameworks written, drawn, and devised do not prevent you getting hacked - only Technology, Tools and Team Members can do this. The systemic disintegration of the Internet will continue and is spiral out of control unabated! Governments cannot stop this wave of cyber insecurity. The Internet will not get fixed anytime soon, and our privacy and credentials have already been stolen. Confidence in the Internet is declining and compounded by subscribers paying our Governments to carry out surveillance on us. Its not about our Freedom of Speech anymore – it is the Freedom to Respond.

The Combat Ready IT model describes how to put up the defences, deploying new technology, tools, and team members. Empower the workforce using Perpetual Improvement Everywhere to add quality and harmony to the Security culture and stance. This guide should help you understand and leverage technology to support a business from One Man Bands to Thousand Strong Choirs.

About the author

My experience has been grounded in Management Consultancy, IT Operations and Security for thirty plus years. As an engineer, at the age of 22, I developed the Message Waiting Lamp on telephones. I have held various CIO and CTO positions from the age of 24! I have had two strikes at pioneering and still enjoy the cutting edge of technology and still retained as an advisor to several start-ups and enterprise boards. Clients believe my five strengths are: humour, honesty, technical leadership, communicating and strategy. They also say I have uncanny super caster abilities. I travel a great deal and have held operations, project management and process consultant roles in several companies and tenures in forty-four countries. I have spoken at numerous conferences and also educate graduates as a visiting lecturer. I have been engaged by Banks and Venture Capitalists, Credit Card Providers, Military, Government, Telecoms, Cloud Service Providers, Mobile and Technology sectors. My Architecture skills were honed by designing forty-two global reach Internet and VOIP networks. I have project managed billion dollar projects and crafted and managed IT Service outsourced contracts. I turn around ailing companies and as the son of s Scots accountant have saved organisations half a billion dollars in realised cost savings! Pictures on the wall; sixteen IT Certifications for IT Security, ITIL, VOIP, IPTV, Fibre Optic and Cable Networks, Database and Application Design, Systems and Storage, Mobile Coding and Development, ERP and Business Intelligence. Recently I have designed Cloud and Hybrid Data Centres in six countries and become an IOS mobile developer! My mother has no idea what I have been doing for the last quarter of a century!

Thanks for submitting a review!

Your review will need to be approved by the author before being posted.

See Inside
Front Cover

Loading book cover...

Book Image Not Available Book Image Not Available
Session Expiration WarningYour session is due to expire.

Your online session is due to expire shortly.
Would you like to extend your session and remain logged in?

Session Expired

Your session has expired.We're sorry, but your online session has expired.
Please log back into your account to continue.

This site uses cookies. Continuing to use this site without changing your cookie settings means that you consent to those cookies to enhance site navigation and the overall user experience. Learn more about our privacy policy or learn more about how to turn off cookies.