O'Reilly logo

Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security by Serge Vereecke, Stefaan Van Daele, Gretchen Marx, Christian Mark, Mark Johnston, Vladimir Jeremic, Jaco Jacobs, Jan Flegr, Peter Brittenham, Martin Borrett, Brian Blackshaw, Saritha Arunkumar, Axel Buecker

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Introducing the IBM Security Framework and IBM Security Blueprint
To provide some background and to set the scene for the IBM Security Framework and IBM Security Blueprint, this chapter starts with a description of the typical business context for information technology (IT) security. This chapter examines how business leaders can use security, risk, and compliance-related investments to competitively position their organizations and satisfy complex regulatory requirements. The remainder of this chapter is dedicated to introducing the IBM Security ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required