Achieving and Sustaining Secured Business Operations

An Executive’s Guide to Planning and Management

  • Neelesh Ajmani
  • Dinesh Kumar

Table of contents

  1. Front Matter
    Pages i-xviii
  2. Neelesh Ajmani, Dinesh Kumar
    Pages 1-7
  3. Neelesh Ajmani, Dinesh Kumar
    Pages 9-33
  4. Neelesh Ajmani, Dinesh Kumar
    Pages 35-48
  5. Neelesh Ajmani, Dinesh Kumar
    Pages 49-92
  6. Neelesh Ajmani, Dinesh Kumar
    Pages 93-122
  7. Neelesh Ajmani, Dinesh Kumar
    Pages 123-141
  8. Neelesh Ajmani, Dinesh Kumar
    Pages 143-158
  9. Back Matter
    Pages 159-168

About this book


Proactively plan and manage innovation in your business while keeping operations safe and secure. This book provides a framework and practices to help you safeguard customer information, prevent unauthorized access, and protect your brand and assets.

Securing company operations is a board-level discussion. Across all industries, companies are pouring millions of dollars into taming cybercrime and other related security crime. Achieving and Sustaining Secured Business Operations presents a holistic approach looking top down, bottom up, and sideways. The end goal is to achieve and sustain a safe environment to conduct secured business operations while continuously innovating for competitive advantage.

What You’ll Learn:

  • Discover why security, specifically secured business operations, needs to be part of business planning and oversight by design and not left to technologists to make the business case
  • Determine what you can do in your role and in your organization to drive and implement integration and improvements in planning and managing secured business operations in conjunction with other business planning and management activities
  • Choose ways in which progress toward achieving and sustaining secured business operations can be measured
  • Understand best practices for organizing, planning, architecting, governing, monitoring, and managing secured business operations
  • Create a framework, including methods and tools for operationalizing assessment, planning, and ongoing management of secured business operations
  • Use cases and potential case studies for various industries and business models


Cybersecurity Security Secured Business Model Secured Business Security Services Secured Operations Model Secured Operations Security Business Drivers Infrastructure Security Risk Management Security Management

Authors and affiliations

  • Neelesh Ajmani
    • 1
  • Dinesh Kumar
    • 2
  1. 1.HopkintonUSA
  2. 2.Chadds FordUSA

Bibliographic information