McAfee experts launch book to help security-obligated executives

McAfee announced the launch of Security Battleground: An Executive Field Manual, a book based on the authors’ security experience with large global corporations. Michael Fey, Brian Kenyon, Kevin Reardon, Bradon Rogers and Charles Ross have identified a group of individuals who is increasingly finding themselves responsible for ensuring their enterprises are secure. The book was written for Chief Information Officers (CIOs), Chief Information Security Officers (CISOs) and other C-level executives who are responsible for material threats and information security in their enterprises. Security Battleground provides guidance on the hard questions to ask when validating a security team’s strategic plan, its budget and its operations.

“Any top company or institution can suffer irreparable harm at the hands of cyber-attackers. Today it’s estimated that more than one trillion dollars in damages can be attributed to this battle - and this number is expected to skyrocket to more than five trillion within the next five years alone,” said Michael Fey, senior vice president at McAfee. “This battle has turned into a war and it is being fought unlike any other and this was the question that started our journey to write this book.”

Part I - Field Manual for the Battleground - This first section explains the origin of the book as a field manual written for the security-obligated executive who has accepted responsibility for overseeing the organization’s security.

  • Assessing Mission Readiness shows how to assess the security team’s maturity and encourages improvements in the team’s approach to security threats and countermeasures.
  • Developing the Strategy provides an overview of the strategic planning process, with a special emphasis on building a plan based on a foundation of clearly documented business risks and compliance obligations. This chapter sets the expectation that security needs a strategic plan, just like any other line of business.

Part II - Preparing for Battle - This section offers advice on gathering information, analysis, regulation compliance and developing a strategic security plan.

  • Recognizing and Capturing Risk reveals the authors’ methodology for gathering key business information. An exercise called Riches, Ruins & Regulations is the centerpiece.
  • Performing Threat Analysis explains how the security team marries business risk to vulnerabilities and threats.
  • Adhering to Regulations addresses the issues of regulatory compliance, which is another form of business risk. Failure to pass a compliance audit can lead to fines and sanctions that can be as harmful as a hacker’s attack.
  • Preparing the Strategic Plan shows how the building blocks fit together. Threats and compliance obligations are pitted against programs that provide controls (i.e. protection).

Part III - Winning the War - This section gives practical information about budgets, measurements, crises, cooperation with other businesses and looks towards the future.

  • Funding the War is about the budget and while building a business case remains a fundamental building block, security budgeting inevitably depends on a forthright discussion with security-obligated executives as to what risks the company is willing to tolerate.
  • Measuring Success provides guidance about the use of security metrics to manage and optimize security operations.
  • Managing Crises is a proactive guide on how to prepare for a security breach. The book identifies four key steps, beginning with containment and ending with remediation.
  • Aligning the Allies speaks to the need for security organizations to cultivate shared understandings within and outside of the company. Traditional company boundaries have evolved and the book focuses on how to align resources to work in concert with trading partners towards the shared goal of strong security.
  • Future Proofing looks at the security horizon with an emphasis on anticipating the next generation of threats. In this chapter current trends such as cloud computing, virtualized processing and storage systems, and the consumerization of IT are discussed.
 [March 2, 2012]

Send this IT news to a friend
Recipient :
(enter the e-mail address of the recipient)

(enter your name)

(enter your e-mail address)


Other IT news about McAfee

  • McAfee Defines Strategy for Securing the Internet of Things (April 10, 2014)
  • Siemens and McAfee, a division of Intel Security, team up to provide security solutions and services for industrial customers (April 8, 2014)
  • McAfee Labs ForecastsGrowth in Mobile Ransomware and Security-aware Attacks in 2014 (January 2, 2014)
  • McAfee Delivers Unprecedented Situational Awareness with Enhanced SIEM Solution (October 3, 2013)
  • McAfee Offers Solution to Remediate Advanced Malware (October 3, 2013)
  • Study by McAfee and IHL Group finds PCI compliance and security vulnerabilities are top concerns for POS systems (August 27, 2013)
  • McAfee Data Centre Suite Provides Elastic Security for Hybrid Data Centres (August 26, 2013)
  • McAfee Labs Q2 Report Finds Mobile Threats Rebound (August 21, 2013)
  • CSIS Releases First Study to Connect Cybercrime to Job Loss (July 24, 2013)
  • McAfee Announces Worldwide Availability of McAfee LiveSafe (July 23, 2013)
  • McAfee Completes Tender Offer of Stonesoft, Makes Next-Generation Firewall Immediately Available (July 8, 2013)
  • McAfee Study on Big Security Data Reveals Businesses Unable to Harness its Power to Protect Against Threats (June 19, 2013)
  • McAfee Launches Smart Perimeter Beta - First of Its Kind Security Feature to Alert Users If Their Devices Go Missing (June 11, 2013)
  • McAfee Quarterly Threat Report Sees Social Media Worm Resurgence as Spam Rises Dramatically (June 3, 2013)
  • McAfee Canada Volunteers Educate More Than 2,000 Students and 300 Parents About Online Safety and Cybersecurity (May 30, 2013)
  • McAfee Simplifies Mobile Device Management and Data Security (May 29, 2013)
  • McAfee Transforms Endpoint Security Market with Industry’s First Chip-to-Application Coverage (May 29, 2013)
  • McAfee Sets New Standard for Network IPS Performance (May 10, 2013)
  • McAfee Report Details Risks to Retailers Through Point of Sale Systems (April 8, 2013)
  • McAfee Predicts Rapid Evolution of Cyberthreats in New Year (January 2, 2013)
  • McAfee Threats Report Shows Global Expansion of Cybercrime (November 14, 2012)
  • McAfee, Xerox Reveal Solution for Protecting Print Devices and Data (October 25, 2012)
  • McAfee Announces McAfee Vulnerability Manager (October 25, 2012)
  • McAfee Advances Endpoint Security to Reach Highest Levels of Protection and Performance (October 24, 2012)
  • McAfee Launches New Data Centre Security Suites (October 15, 2012)
  • McAfee Names IT Industry Veteran Luc Villeneuve to Lead its Canadian Operations (September 24, 2012)
  • McAfee Helps Protect Windows 8  (September 18, 2012)
  • McAfee Threats Report Shows Largest Malware Rise in Four Years (September 4, 2012)
  • New Version of McAfee Mobile Security Provides Advanced Privacy Features For Smartphone and Tablet Users (August 20, 2012)
  • McAfee Commentary in Response to Yahoo! Security Breach (July 13, 2012)
  • McAfee Keeps Consumers Connected After DNS Access Cut Off (July 9, 2012)
  • McAfee Canada Launches New Resource Website: The State of Consumer and Enterprise Security in Canada (June 29, 2012)
  • Pacific Northwest National Laboratory Report Reveals Dramatic Increase in Cyber Threats and Sabotage on Critical Infrastructure and Key Resources (June 19, 2012)
  • McAfee Report Reveals a Disconnect Between Perceived and Real Security Levels in Canadian Governments (June 14, 2012)
  • McAfee Extends its Security Leadership in the Cloud and Enhances its Cloud Security Platform (June 12, 2012)
  • McAfee Risk and Compliance Outlook Report Finds SIEM and Database Security Are Top Priorities (May 29, 2012)
  • McAfee Q1 Threats Report Finds Significant Malware Increase Across All Platforms (May 23, 2012)
  • McAfee Aims to Protect Critical Infrastructure from Increased Attacks (May 15, 2012)
  • McAfee Increases Focus on Growing SMB Market (May 14, 2012)
  • McAfee Unveils the First Situational and Risk Aware SIEM (April 24, 2012)
  • McAfee report exposes contradictions in security perception vs. reality (March 6, 2012)
  • McAfee Mobile Security Software Available on New Lenovo ThinkPad Tablets (January 18, 2012)
  • McAfee Labs 2012 Threat Predictions Include High-Profile Industrial Attacks, Cyberwarfare Demonstrations and New Hacktivist Targets (January 3, 2012)
  • McAfee whitepaper - Securing Mobile Devices (December 8, 2011)
  • McAfee Warns Consumers of the “12 Scams of Christmas” (November 10, 2011)
  • McAfee Takes Cloud Computing Security to the Next Level (November 7, 2011)
  • McAfee Announces Initiatives to Help Drive Partner Profitability (October 24, 2011)
  • McAfee Shares Vision for Bringing Mobile Devices into the Security Infrastructure (September 21, 2011)
  • McAfee Reveals Details of Targeted Attacks - Shady RAT: Canadian government a target (August 3, 2011)
  • McAfee Reminds Canadians to Beware the "The Twelve Scams of Christmas" (December 16, 2010)
  • Bell launches secure Internet service for small and medium size enterprises (October 19, 2010)
  • Intel to Acquire McAfee for approximately $7.68 billion (August 19, 2010)
  • McAfee, Inc. Launches Program for Added Security in the Cloud (March 17, 2010)
  • Facebook and McAfee Partner to Make the Internet More Secure (January 15, 2010)
  • Telos Achieves Technology Partner Status in McAfee Security Innovation Alliance (January 14, 2010)
  • McAfee Labs Predicts Facebook, Twitter Will Be Platforms of Choice for Emerging Threats (January 4, 2010)
  • McAfee Releases Fastest, Most Convenient Way for Consumers to Fix Computer Problems, Remotely (December 15, 2009)
  • McAfee, Inc. to Deliver Network Security IPS Solution with Integrated Zero-Day Malware Protection (December 9, 2009)
  • McAfee, Inc. Warns Consumers about “The Twelve Scams of Christmas,” or Popular Online Attacks This Holiday Season (November 23, 2009)
  • McAfee Inc. Warns of Countries Arming for Cyberwarfare (November 18, 2009)
  • McAfee, Inc. Reports Average Midsize Company Lost $43,000 to Security Breaches Last Year (October 29, 2009)
  • McAfee, Inc. Announces Strategy to Lead Email Security Market (October 20, 2009)
  • McAfee, Inc. Announces Grants and New Council Member in Initiative to Fight Cybercrime (October 14, 2009)
  • Verizon Business and McAfee Form Strategic Alliance (October 9, 2009)
  • McAfee, Inc. Gears Up to Launch New Online Support Community (October 7, 2009)
  • McAfee, Inc. Names Jessica Biel the Most Dangerous Celebrity in Cyberspace (August 26, 2009)
  • McAfee, Inc. to Acquire MX Logic and Provide Industry’s Most Comprehensive Security-as-a-Service Portfolio (August 4, 2009)
  • McAfee President and CEO Dave DeWalt Unveils "Predictive Security" Vision (April 24, 2009)
  • McAfee Partners with Network Frontiers to Streamline Compliance for Customers (April 20, 2009)
  • Absolute and McAfee Partner to Offer Consumers Absolute’s Computrace LoJack for Laptops (April 10, 2009)
  • Rocky Mountain RAM Introduces McAfee Anti-Virus Enabled Flash Drives for the Government Market (April 8, 2009)
  • Conficker Is No Joke, Says McAfee, Inc. (April 1, 2009)
  • Cybercriminals snub "Slumdog Millionaire" for "Frost Nixon," says McAfee (February 20, 2009)
  • McAfee, Inc. Predicts Slumping Economy Driving Malware Threats (January 21, 2009)
  • Liquid Machines and McAfee Announce Partnership to Integrate Data Loss Prevention and Enterprise Rights Management (December 9, 2008)
  • ArcSight and McAfee Integrate Flagship Security and Compliance Platforms (November 25, 2008)
  • McAfee completes acquisition of Secure Computing (November 20, 2008)
  • Seagate and McAfee Drive Advances in Self-Encrypting Notebook Computers (November 11, 2008)
  • McAfee Research reveals mothers rate cyber dangers as high as drunk driving or experimenting with drugs (October 24, 2008)
  • McAfee and Commvault form strategic alliance (October 21, 2008)
  • McAfee announces support for Intel-based Laptops and Mobile Internet Devices (August 21, 2008)
  • McAfee completes acquisition of Reconnex (August 15, 2008)
  • McAfee to provide security software on HP commercial PC (August 8, 2008)
  • McAfee teams up with Toshiba to provide comprehensive security suite for new computers (August 4, 2008)
  • McAfee agrees to acquire Reconnex for $46 million in cash. (August 1, 2008)
  • McAfee participates in VMWare Alliance Affiliate Initiative (July 2, 2008)
  • McAfee launches anti-theft protection for consumers and small business (June 16, 2008)
  • YAHOO! and McAfee Partner to Make Searching the Web More Secure For Users (May 7, 2008)
  • McAfee announced exclusives partnership with Acer (April 30, 2008)
  • McAfee delivers McAfee M-8000 Network Security Platform and the McAfee Content Security Blade Server (April 23, 2008)
  • McAfee Releases GroupShield 7 for Microsoft Exchange and Lotus Domino (December 26, 2007)
  • McAfee Inc. Offers Tips for a Spam-Free Summer (June 27, 2007)
  • McAfee Inc. Releases 2007 ’North America Criminology Report: Organized Crime and the Internet’ (June 5, 2007)
  • McAfee, Inc. Provides One of the First Solutions to Achieve ICSA Anti-Virus Certification for Microsoft Windows Vista (February 13, 2007)
  • McAfee company to provide solution to protect Microsoft Exchange Server 2007 (February 6, 2007)
  • McAfee Reports on Online Identity Theft Trends (January 15, 2007)
  • McAfee Inc. Names Jeff Green Head of McAfee Avert Labs (November 20, 2006)
  • One-Millionth McAfee-Protected msystems U3 Smart Drive Ships (November 9, 2006)
  • McAfee, Inc. Reports Botnets Threaten National Infrastructure and Security (October 24, 2006)
  • McAfee SiteAdvisor Spam Quiz Finding: Intuition Not Enough to Spot ’Spammy’ Sites (September 26, 2006)
  • McAfee, Inc. Reports Alarming Changes to Spam Campaigns (September 13, 2006)
  • McAfee, Inc. Reports on Adware and Spyware Growth (September 11, 2006)
  • McAfee Selected by U.S. Air Force as Standard in Intrusion Prevention (August 15, 2006)
  • McAfee Cautions Microsoft Windows Customers About Critical Security Vulnerability (August 11, 2006)
  • McAfee, Inc. and Skype Collaborate; Skype Certifies McAfee Internet Security Suite 2006 (August 4, 2006)
  • McAfee, Inc. Names Dave Dickison North America Channel Executive (July 21, 2006)
  • McAfee Reports Security Threats Doubled in Record Time (July 6, 2006)
  • McAfee Identifies ’Miracle Diet’ Web Sites That Thin the Wallet, Not the Waist (June 27, 2006)
  • McAfee Unveils Beta Versions of Two New Consumer Security Suites (June 16, 2006)
  • McAfee Avert Labs Marks Reemergence in the Area of Vulnerability Discovery and Disclosure (June 12, 2006)
  • McAfee, Inc. Unveils New Threat Center Portal (April 10, 2006)
  • McAfee Launches Global Services Strategy Providing Opportunities for Partners (March 13, 2006)
  • McAfee Provides Protection Against New Mac Os X Exploits and Viruses (February 23, 2006)

    Website based on SPIP, an Open Source program under GNU/GPL licence