Foreword
As the custodian of the IBM® Security Blueprint and sponsor of this initiative, I am delighted to introduce this latest edition of the IBM Security Blueprint. It follows from the tremendous success of and interest from clients around the world in the second edition, which was downloaded more than 21,000 times. It is used by many clients and their security professionals. The need for a structured and well-founded approach to security capabilities is something our clients tell me that is vital in this era of cyber threats and rigorous regulation.
The initial idea for this third version of the IBM Security Blueprint started during informal discussions with clients and colleagues at the IBM Pulse international conference in Las Vegas during ...

Get Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.