Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Achieving and Sustaining Secured Business Operations - Neelesh Ajmani, Dinesh Kumar

Achieving and Sustaining Secured Business Operations (eBook)

An Executive’s Guide to Planning and Management
eBook Download: PDF
2017 | 1st ed.
XVIII, 168 Seiten
Apress (Verlag)
978-1-4842-3099-2 (ISBN)
Systemvoraussetzungen
34,99 inkl. MwSt
(CHF 34,15)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

Proactively plan and manage innovation in your business while keeping operations safe and secure. This book provides a framework and practices to help you safeguard customer information, prevent unauthorized access, and protect your brand and assets.

Securing company operations is a board-level discussion. Across all industries, companies are pouring millions of dollars into taming cybercrime and other related security crime. Achieving and Sustaining Secured Business Operations presents a holistic approach looking top down, bottom up, and sideways. The end goal is to achieve and sustain a safe environment to conduct secured business operations while continuously innovating for competitive advantage.

What You'll Learn

  • Discover why security, specifically secured business operations, needs to be part of business planning and oversight by design and not left to technologists to make the business case
  • Determine what you can do in your role and in your organization to drive and implement integration and improvements in planning and managing secured business operations in conjunction with other business planning and management activities
  • Choose ways in which progress toward achieving and sustaining secured business operations can be measured
  • Understand best practices for organizing, planning, architecting, governing, monitoring, and managing secured business operations
  • Create a framework, including methods and tools for operationalizing assessment, planning, and ongoing management of secured business operations
  • Use cases and potential case studies for various industries and business models

Who This Book Is For

Chief executive officers and their leadership team; chief operations officers; chief information officers and their leadership team; chief information security officers; business functional middle managers; and enterprise, solution, and information technology architects



Neelesh Ajmani has over 28 years of experience in solving critical business issues in public and private sectors, with expertise in digital transformation, risk management, secured business operations, strategic planning, organizational design, agile program management, enterprise architecture, and information management. He is a specialist advisor in healthcare and life sciences for NTT Data Services. Being an entrepreneur, he is also affiliated with Mitovia, Inc. as Chief Services Officer, advising and developing a body of knowledge and services offerings, including content and services for achieving and sustaining secured business operations. 

Neelesh worked at Cisco for 15 years in advisory, delivery, and leadership roles, specializing in Internet commerce, identity and access management, and manufacturing solutions. He has delivered business solutions with state-of-the art technology solutions for many Fortune 500 organizations in the manufacturing and banking industries, for the Supreme Court of India, and for the federal government of India. 

Neelesh has an MBA from San Jose State University, and an MS in Computer Applications from Jawaharlal Nehru University, India. He is certified in Advanced Program Management from Stanford University, PMP, TOGAF Enterprise Architecture, and is an ITIL V3 Expert. His current research is focused on planning and managing business information risk and security management.

Dinesh Kumar is co-founder and CTO at Mitovia, Inc., and has over 30 years of experience in technology business management, strategic planning, value measurement and communication, capability assessment and planning, and governance. At Mitovia he is driving business-minded, knowledge-driven practices and solutions for planning and managing organizational capabilities, including digital, security, competency, and shared services management. 

Dinesh has filed a patent on capability-driven, service-oriented planning. He is also an adjunct professor at Stevens Institute of Technology, teaching technology business management and process innovation courses to MBA and MSIS students. He is a board member and principal at the Innovation Value Institute, where he is developing and driving capability models and practices for managing IT for business value. He is a founding member and major contributor at The Value Council, a non-profit organization focused on improving value management practices. 

Dinesh has held a broad variety of sales, consulting, and management roles at Microsoft, Informix, and Unisys. He has an MBA degree from Penn State University, and an MS in Computer Science from Rutgers University.


Proactively plan and manage innovation in your business while keeping operations safe and secure. This book provides a framework and practices to help you safeguard customer information, prevent unauthorized access, and protect your brand and assets.Securing company operations is a board-level discussion. Across all industries, companies are pouring millions of dollars into taming cybercrime and other related security crime. Achieving and Sustaining Secured Business Operations presents a holistic approach looking top down, bottom up, and sideways. The end goal is to achieve and sustain a safe environment to conduct secured business operations while continuously innovating for competitive advantage.What You'll LearnDiscover why security, specifically secured business operations, needs to be part of business planning and oversight by design and not left to technologists to make the business caseDetermine what you can do in your role and in your organization to drive and implement integration and improvements in planning and managing secured business operations in conjunction with other business planning and management activitiesChoose ways in which progress toward achieving and sustaining secured business operations can be measuredUnderstand best practices for organizing, planning, architecting, governing, monitoring, and managing secured business operationsCreate a framework, including methods and tools for operationalizing assessment, planning, and ongoing management of secured business operationsUse cases and potential case studies for various industries and business models Who This Book Is For Chief executive officers and their leadership team; chief operations officers; chief information officers and their leadership team; chief information security officers; business functional middle managers; and enterprise, solution, and information technology architects

Neelesh Ajmani has over 28 years of experience in solving critical business issues in public and private sectors, with expertise in digital transformation, risk management, secured business operations, strategic planning, organizational design, agile program management, enterprise architecture, and information management. He is a specialist advisor in healthcare and life sciences for NTT Data Services. Being an entrepreneur, he is also affiliated with Mitovia, Inc. as Chief Services Officer, advising and developing a body of knowledge and services offerings, including content and services for achieving and sustaining secured business operations. Neelesh worked at Cisco for 15 years in advisory, delivery, and leadership roles, specializing in Internet commerce, identity and access management, and manufacturing solutions. He has delivered business solutions with state-of-the art technology solutions for many Fortune 500 organizations in the manufacturing and banking industries, for the Supreme Court of India, and for the federal government of India. Neelesh has an MBA from San Jose State University, and an MS in Computer Applications from Jawaharlal Nehru University, India. He is certified in Advanced Program Management from Stanford University, PMP, TOGAF Enterprise Architecture, and is an ITIL V3 Expert. His current research is focused on planning and managing business information risk and security management.Dinesh Kumar is co-founder and CTO at Mitovia, Inc., and has over 30 years of experience in technology business management, strategic planning, value measurement and communication, capability assessment and planning, and governance. At Mitovia he is driving business-minded, knowledge-driven practices and solutions for planning and managing organizational capabilities, including digital, security, competency, and shared services management. Dinesh has filed a patent on capability-driven, service-oriented planning. He is also an adjunct professor at Stevens Institute of Technology, teaching technology business management and process innovation courses to MBA and MSIS students. He is a board member and principal at the Innovation Value Institute, where he is developing and driving capability models and practices for managing IT for business value. He is a founding member and major contributor at The Value Council, a non-profit organization focused on improving value management practices. Dinesh has held a broad variety of sales, consulting, and management roles at Microsoft, Informix, and Unisys. He has an MBA degree from Penn State University, and an MS in Computer Science from Rutgers University.

Erscheint lt. Verlag 7.12.2017
Zusatzinfo XVIII, 168 p. 39 illus. in color.
Verlagsort Berkeley
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Mathematik / Informatik Mathematik Finanz- / Wirtschaftsmathematik
Wirtschaft Betriebswirtschaft / Management Unternehmensführung / Management
Schlagworte cybersecurity • infrastructure security • Risk Management • Secured Business • Secured Business Model • Secured Operations • Secured Operations Model • security • Security Business Drivers • security management • security services
ISBN-10 1-4842-3099-X / 148423099X
ISBN-13 978-1-4842-3099-2 / 9781484230992
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 5,2 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Umfassendes Sicherheits-, Kontinuitäts- und Risikomanagement mit …

von Klaus-Rainer Müller

eBook Download (2023)
Springer Fachmedien Wiesbaden (Verlag)
CHF 78,15
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
CHF 41,95