Muutke küpsiste eelistusi
  • Formaat - PDF+DRM
  • Hind: 62,39 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book introduces a strategic, business-aligned model for integrating cybersecurity and IT operations that acknowledges the friction between legacy systems and modern demands, global operations and local control, innovation and compliance. It reframes security as an embedded operational function, not an isolated overlay.



Building and sustaining cybersecurity in the enterprise isn’t just a technical challenge; it is an organizational imperative. In a world where most guidance is geared toward mid-sized environments, Integrated Assurance fills a critical gap by addressing the realities of large, complex enterprises where traditional security practices break down.

This book introduces a strategic, business-aligned model for integrating cybersecurity and IT operations that acknowledges the friction between legacy systems and modern demands, global operations and local control, and innovation and compliance. It reframes security as an embedded operational function, not an isolated overlay.

With practical insights and a disciplined methodology, Integrated Assurance helps leaders navigate organizational silos, align teams around shared goals, and manage risk across fractured environments. It’s a guide for those ready to move beyond checklists and fire drills and toward building systems that are resilient, secure by design, and aligned with business growth.

Ideal for CISOs, CIOs, enterprise architects, risk officers, and transformation leaders, this book is for anyone who lives at the intersection of complexity and accountability and who is ready to bridge the divide between security and operations.

Arvustused

Integrated Assurance: Unified Risk Strategy by Patrick Hayes is a refreshing and grounded look at the real challenges that large enterprises face when trying to align cybersecurity, IT operations, and risk. Hayes does not pretend that these groups naturally work together or that a new tool will magically solve long-standing issues. Instead, he offers a practical, experience-based model that acknowledges the organizational friction many leaders encounter every day.

One of the strongest and most memorable points in the book is Hayes message that security is no longer a separate function but an operational competency that must evolve in step with the business. This idea stands out because it reflects the reality of modern organizations. Security cannot succeed in isolation, and Hayes demonstrates that meaningful progress occurs only when security is embedded into daily operations, rather than existing as an external audit function. The writing feels genuinely thoughtful and relatable. Hayes draws on decades of experience as a CISO, enterprise security architect, and technology executive, and his expertise is evident in the clarity of his explanations. He walks readers through complex environments without overwhelming them, addressing global operations, legacy systems, regulatory demands, and the growing need to unify DevOps and cybersecurity practices.

Overall, Integrated Assurance provides a human-centered and efficient blueprint for leaders seeking to break down silos and build a resilient organization. It gives both strategic guidance and reassurance, reminding readers that alignment is achievable when everyone understands that security is a shared responsibility. This book is an excellent resource for CISOs, CIOs, enterprise architects, and risk leaders navigating the complexities of modern enterprise security.

Tim Godlove, Ph.D.

The book delivers a comprehensive blueprint for unifying cybersecurity, IT operations, and enterprise risk management. Hayes articulates what many leaders in complex organizations are striving towarda truly integrated, data-driven assurance model that embeds resilience into daily operations rather than treating it as an afterthought.

Top Themes and Strengths Unified Risk Strategy: Moves assurance from fragmented oversight to a shared governance model that connects IT, risk, and business performance. Operational Integration: Demonstrates how to translate frameworks like NIST, COBIT, ITIL, and ISO into a single, coherent system. Integrated Assurance Maturity Model (IAMM): A pragmatic tool for assessing and improving enterprise assurance maturity. Federated Governance: Balances global oversight with local compliance and operational agility. Human-Centric Assurance: Recognizes the cultural and behavioral side of resilience, not just the technical. Technology and AI Enablement: Envisions real-time, continuous control validation through automation and AI. Strategic Value: Positions assurance as a leadership discipline that enhances trust, transparency, and long-term performance.

The writing blends practical insight with strategic foresight. Hayes captures the tension between innovation and compliance that every global enterprise faces and provides an actionable way forward.

This is one of the most complete works Ive seen connecting governance, risk, and operations in a way that senior leaders can implement without overcomplicating execution. It reads like a field guide for modern CISOs, CIOs, and enterprise architects navigating digital trust at scale.



Brian Albertson

Hayess book is an important contribution to the growing body of work that pushes cybersecurity risk management from the marginsa nice to haveto center stage. But he takes the story still further, widening the aperture to make a compelling case for a more collaborative comprehensive and focused approach IT operations, cyber security and risk management. Its not enough to just build a good cyber program, Hayes argues, but rather it must have its roots in a whole of company coordinated effort to deal with all three tasks in concert. This book is about both the why and the mechanics and hard work required to get there.

At the outset looking at the state of cyber security Hayes pronounces dead stovepipes that that have for too long looked at IT operations, cyber security and risk management and activities separate from each other and, more crucially, failing to align withand enablemeeting business objectives. In making his case Hayess most important strengths are not just readily apparent expertise and experience but the thought he has put into to how think comprehensively about building the whole required to mitigate internal and external risk.

To this end, Hayes builds his book around two themes: collaboration and alignment. He argues that we need to view IT operating systems, cybersecurity, and cybersecurity risk of a piece developing a system that integrates all three tasks in concert in a collaborative environment that draws on the business side for expertise as much as technical experts to ensure alignment. This is not an easy task and Hayes never wanders, never loses focusits always about building a coherent sustainable system consistent with his broadly gauged approach.

For users, Integrated Assurance is an end-to-end planning tool. Hayess work is a carefully thought out construction project in four parts that captures the complexity of the process and that never loses sight of the the end game.

The planning process is the same regardless of the type or size of the company





In the first four chapters (Part I) Hayes sets out the business case for his approach and defines and explains in detail how operations management (IT), cybersecurity and risk management are of a piece in enabling business objectives. To break the mold Hayes starts at the top assigning senior executives the task of buying into his argument and pulling together and supporting the right cross-company team to work the process and build a sustainable well-funded program. . Chapters 5 through 8 (Part 2) walk users step by step through the process of integrating IT and cybersecurity and cyber risk management with and and how cybersecurity together they relate to governance and risk management..





The remaining chapters (Parts 3 and 4) focus on the real impact of an integrated approach and steps to integrate and sustain his approach over the long term. One of the last tables, for example, is plan executives can use to permanently embed the Hayess approach int strategic planning.

The chapters are a roadmap. Each is a building blocks set out in sequence intended to move each of the component parts of the process forward in parallel, reinforcing themes of integration and alignment. Hayess deep and wide expertise are readily apparent. The chapters follow a standardized format that starts with clear learning objectives that explain whats ahead and how meeting them moves the process forward; concepts and terminology important to the main points follow.





The text is built around frameworks, that as guides help users organize their planning, and details the range of software and other tools that facilitate collaboration and standardize procedures to meet specific requirements. . Hayes summarizes the text in well-crafted easily read tables that have appearanceperhaps deliberatelyof menus to make choices clear to planning teams, not just technical experts. in Chapter recaps and summaries reinforce learning and look ahead to tee-up what next. A list of abbreviations, a comprehensive glossary of terms, and useful index add to the texts accessibility.

Its hard to capture in a brief review what Hayes has accomplished here. In a 260 page text he moves cyber security to center stage, makes a compelling case for a whole of company planning process to identify and mitigate cyber risk, and gives users a detailed path to a plan that from the start prioritizes breaking down stovepipes and winning management buy as prerequisites to build what the title acknowledges is a Unified Risk Strategy.

I would note that carrying the story still further the coming of AI has all but eliminated entry level positions and meet the new requirements as Hayes sets out will require new applicants to demonstrate analytic and critical thinking skills to fit into the far more complex operating environment that Hayes is advocating.

- Jay Grusin, PhD

PART 1: IT Operations Management and Cybersecurity Landscape

Chapter 1: Introduction To It Operations Management and Cybersecurity

Chapter 2: Enterprise IT Operations Management Essentials

Chapter 3: Enterprise Cybersecurity Risk Management Essentials

Chapter 4: Exploring the Evolving Landscape of Technology in Large
Enterprises

PART 2: Enterprise IT and Cybersecurity Complexity

Chapter 5: The Role of IT and Cybersecurity Process, Policies, and Controls
in Enterprise Organizations

Chapter 6: The Use of Compensating Controls

Chapter 7: Resourcing Cybersecurity and Enterprise Organizations

Chapter 8: Outsourcing and Third-Party Risk Management

PART 3: The Case for Cybersecurity and Operational Alignment

Chapter 9: Cybersecurity and IT Operations Alignment

Chapter 10: DevSecOps and DevOps Alignment

Chapter 11: IT Operations, Cybersecurity and Governance, Risk, and
Compliance

Chapter 12: Aligning IT Operations and Cybersecurity with Business
Objectives

PART 4: Integrated Assurance Unified Risk Strategy

Chapter 13: Integrated Assurance - Unifying Cybersecurity and IT Operations
for the Enterprise

Chapter 14: Integrated Assurance as an Organizational Competency

Chapter 15: Implementing Integrated Assurance

Chapter 16: The Future of Integrated Assurance in Enterprise Security
Patrick M. Hayes is a recognized strategy and operations leader, certified enterprise security architect, and technology executive with over two decades of experience driving innovation, growth, and resilience in the IT and cybersecurity sectors. Throughout his career, he has founded or scaled multiple startups and has spearheaded global expansion strategies across North America, Latin America, and Europe.

Patrick has served in senior executive roles including Chief Strategy Officer, Chief Product Officer, and Chief Information Security Officer, where he architected and launched award-winning SaaS platforms in risk management and security operations. As a certified enterprise security architect, he has led several large-scale security transformation programs for Fortune 500 companies, delivering trusted results in complex and highly regulated environments.

A trusted advisor to emerging tech companies and an active contributor to the cybersecurity community, Patrick blends technical depth with strategic insight. He is a frequent speaker and published author in business and security journals and holds multiple industry certifications.

Patrick is the creator of the Integrated Assurance Unified Risk Strategy and the Integrated Assurance Maturity Model (IAMM), frameworks that have helped modernize cybersecurity, governance, and operational assurance across global enterprises. Patrick is also the registered trademark holder of Integrated Assurance®, reinforcing his leadership and thought ownership in this evolving field.